Skip to main content

Full text of "USPTO Patents Application 10088784"

See other formats


This Page Is Inserted by IFW Operations 
and is not a part of the Official Record 

BEST AVAILABLE IMAGES 

Defective images within this document are accurate representations of the 
original documents submitted by the applicant. 

Defects in the images may include (but are not limited to): 

• BLACK BORDERS 

• TEXT CUT OFF AT TOP, BOTTOM OR SIDES 

• FADED TEXT 

• ILLEGIBLE TEXT 

• SKEWED/SLANTED IMAGES 

• COLORED PHOTOS 

• BLACK OR VERY BLACK AND WHITE DARK PHOTOS 

• GRAY SCALE DOCUMENTS 

IMAGES ARE BEST AVAILABLE COPY. 



As rescanning documents will not correct images, 
please do not report the images to the 
Image Problems Mailbox. 



WORLD INTELLECTUAL PROPERTY ORGANIZATION 
International Bureau 




PCT 

INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) 



(51) International Patent Classification 6 : 
H04L 12/28 



A2 



(11) International Publication Number: WO 99/63709 

(43) International Publication Date: 9 December 1999 (09.12.99) 



(21) International Application Number: PCT/CA99/00494 

(22) International Filing Date: 28 May 1999 (28.05.99) 



(30) Priority Data: 

09/087,623 



29 May 1998 (29.05.98) 



US 



(71) Applicant: RESEARCH IN MOTION LIMITED [CA/CA]; 

295 Phillip Street, Waterloo, Ontario N2L 3W8 (CA). 

(72) Inventors: MOUSSEAU, Gary, P.; 523B Rosemeadow Cres- 

cent, Waterloo, Ontario N2T 129 (CA). LAZARID1S, Mi- 
hal; 272 Northerest Place, Waterloo, Ontario N2J 3X5 (CA). 

(74) Agent: PERRY, Stephen. J.; Sim & McBurney, 6th floor, 330 
University Avenue, Toronto, Ontario M5G 1R7 (CA). 



(81) Designated States: AE, AL, AM, AT, AU. AZ, BA, BB. BG, 
BR. BY, CA, CH, CN, CU. CZ. DE, DK, EE ES, FI, GB, 
GD. GE. GH. GM. HR. HU, ID. IL. IN, IS. JP. KE, KG. 
KP, KR. KZ, LC, LK, LR, LS, LT. LU. LV. MD. MG, MK, 
MN. MW, MX. NO. NZ, PL, PT, RO. RU. SD. SE SG, SI. 
SK, SL. TJ. TM, TR. TT. UA. UG. UZ. VN. YU, ZA. ZW. 
ARIPO patent (GH, GM, KE, LS. MW, SD, SL, SZ, UG. 
ZW), Eurasian patent (AM, AZ, BY, KG. KZ, MD. RU. TJ. 
TM), European patent (AT, BE CH. CY. DE, DK, ES, FI. 
FR. GB, GR, IE, IT, LU, MC, NL, PT, SE), OAPI patent 
(BF, BJ, CF. CG. CI, CM. GA, GN, GW, ML, MR, NE. 
SN, TD, TG). 



Published 

Without international search report and to be republished 
upon receipt of that report. 



(54) Title: SYSTEM AND METHOD FOR PUSHING INFORMATION FROM A HOST SYSTEM TO A MOBILE DATA COMMU- 
NICATION DEVICE 



(57) Abstract 

A system and method for pushing infor- 
mation from a host system to a mobile data 
communication device upon sensing a triggering 
event is disclosed. A redirector program operat- 
ing at the host system enables a user to contin- 
uously redirect certain user-selected data items 
from the host system to the user's mobile data 
communication device upon detecting that one 
or more user-defined triggering events has oc- 
cured. The redirector program operates in con- 
nection with event generating applications and 
repackaging systems at the host system to con- 
figure and detect a particular user-defined event, 
and then to repackage the user-selected data 
items in an electronic wrapper prior to pushing 
the data items to the mobile device. 



DESKTOP 
tGHPUTER 




-10 



REDIRECTION SOFTWARE |J> 



r 



30 



FAX OR VOICE 
MACHINE 



WIRELESS 




MOBILE 


GATEWAY 




COMPUTER 



BNSOOCID: <WO 9963709A2J_> 




4 



FOR THE PURPOSES OF INFORMATION ONLY 
Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT. 



AL 


Albania 


ES 


Spain 


LS 


Lesotho 


SI 


Slovenia 


AM 


Armenia 


Fl 


Finland 


LT 


Lithuania 


SK 


Slovakia 


AT 


Austria 


FR 


France 


LU 


Luxembourg 


SN 


Senegal 


AU 


Australia 


GA 


Gabon 


LV 


Latvia 


SZ 


Swaziland 


AZ 


Azerbaijan 


GB 


United Kingdom 


MC 


Monaco 


TD 


Chad 


BA 


Bosnia and Herzegovina 


GE 


Georgia 


MD 


Republic of Moldova 


TG 


Togo 


BB 


Barbados 


GH 


Ghana 


MG 


Madagascar - 


TJ 


Tajikistan 


BE 


Belgium 


GN 


Guinea 


MK 


The former Yugoslav 


TM 


Turkmenistan 


BF 


Burkina Faso 


GR 


Greece 




Republic of Macedonia 


TR 


Turkey 


BG 


Bulgaria 


HU 


Hungary 


ML 


Mali 


TT 


Trinidad and Tobago 


BJ 


Benin 


IE 


Ireland 


MN 


Mongolia 


UA 


Ukraine 


BR 


Brazil 


IL 


Israel 


MR 


Mauritania 


UG 


Uganda 


BY 


Belarus 


IS 


Iceland 


MW 


Malawi 


US 


United States of America 


CA 


Canada 


IT 


Italy 


MX 


Mexico 


UZ 


Uzbekistan 


CF 


Central African Republic 


JP 


Japan 


NE 


Niger 


VN 


Viet Nam 


CG 


Congo 


KE 


Kenya 


NL 


Netherlands 


YU 


Yugoslavia 


CH 


Switzerland 


KG 


Kyrgyzstan 


NO 


Norway 


ZW 


Zimbabwe 


a 


Cote d'lvoire 


KP 


Democratic People's 


NZ 


New Zealand 






CM 


Cameroon 




Republic of Korea 


PL 


Poland 






CN 


China 


ICR 


Republic of Korea 


PT 


Portugal 






cu 


Cuba 


KZ 


Kazakstan 


RO 


Romania 






cz 


Czech Republic 


LC 


Saint Lucia 


RU 


Russian Federation 






DE 


Germany 


U 


Liechtenstein 


SD 


Sudan 






DK 


Denmark 


LK 


Sri Lanka 


SE 


Sweden 






EE 


Estonia 


LR 


Liberia 


SG 


Singapore 







BNSDOCID: *WO 9963709A2_I_> 





PCT/CA99/00494 



WO 99/63709 



System and Method for Pushing Information from a Host 
System to a Mobile Data Communication Device 



BACKGROUND OF THE INVENTION 



10 



15 



20 



The present invention is directed toward the field of replicating 
information from a host system where the information is normally stored to a 
mobile data communication device. In particular, the system and method of the 
present invention provide an event-driven redirection computer program 
("redirector program") operating at the host system, which, upon sensing a 
particular user-defined event has occurred, redirects user-selected data items 
from the host system to the user's mobile data communication device. The 
mobile data communication device is preferably coupled to the host system via 
a wireless network and one or more landline networks. Due to the bandwidth 
limitations of wireless networks, only a portion of a user-selected data item is 
generally redirected to the user's mobile device, with the user given the option 
of then retrieving the entire data item (or some other portion of the data item) 
from the host system. 

Instead of warehousing (or storing) the user's data items at the host 
system and then "synchronizing" the mobile data communication device to data 
items stored at the host system when the mobile device requests that such items 
of information be communicated to it, the present invention employs a "push" 
paradigm that continuously packages and retransmits the user-selected items of 
information to the mobile data communication device in response to a triggering 
event detected at the host system. Wireless mobile data communications 
devices, especially those that can retum a confirmation signal to the host that 
the pushed data has been received are especially well suited for this type of 
push paradigm. 

Present systems and methods for replicating information from a host 
system to a user's mobile data communication device are typically 



BNSOOCID: <WO 9963709A2_I_> 



• i 





WO 99/63709 



PCT/CA99/00494 



-2- 



10 



15 



20 



"synchronization" systems in which the user's data items are warehoused (or 
stored) at the host system for an indefinite period of time and then transmitted 
in bulk only in response to a user request. In these types of systems and 
methods, when replication of the warehoused data items to the mobile device 
is desired, the user typically places the mobile device in an interface cradle that 
is electrically connected to the host system via some form of local, dedicated 
communication, such as a serial cable or an infrared or other type of wireless 
link. Software executing on the mobile data communication device then 
transmits commands via the local communications link to the host system to 
cause the host to begin transmitting the user's data items for storage in a 
memory bank of the mobile device. In these synchronization schemes, the 
mobile unit "pulls" the warehoused information from the host system in a batch 
each time the user desires to replicate information between the two devices. 
Therefore, the two systems (host and mobile) only maintain the same data items 
after a user-initiated command sequence that causes the mobile device to 
download the data items from the host system. A general problem with these 
synchronization systems is that the only time that the user data items are 
replicated between the host system and the mobile data communication device 
is when the user commands the mobile device to download or pull the user data 
from the host system. Five minutes later a new message could be sent to the 
user, but the user would not receive that message until the next time the user 
fetches the user data items. Thus, a user may fail to respond to an emergency 
update or message because the user only periodically synchronizes the system, 
such as once per day. Other problems with these systems include: (1) the 
amount of data to be reconciled between the host and the mobile device can 
become large if the user does not "synchronize" on a daily or hourly basis, 
leading to bandwidth difficulties, particularly when the mobile device is 
communicating via a wireless packet-switched network; and (2) reconciling 
large amounts of data, as can accrue in these batch-mode synchronization 



BNSOOCID; <WO 9963709A2_L> 



■ i 





WO 99/63709 



PCT/CA99/00494 



-3- 



10 



15 



20 



systems, can require a great deal of communication between the host and the 
mobile device, thus leading to a more complex, costly and energy-inefficient 
system. A more automated, continuous, efficient and reliable system of 
ensuring that user data items are replicated at the user's mobile device is 
therefore needed. 

An additional feature of the present invention is that the push paradigm, 
in combination with a return communications pathway, lends itself well to a 
system that permits a user to control remotely, through the user's mobile 
device, a number of aspects of the host system. 

There remains a general need in this art for a system and method of 
continuously pushing user-selected data items (or certain portions of the selected 
data items) stored at a host system to a user's mobile data communication 
device. 

There remains a more particular need for such a system and method 
where user-selected data items are continuously "pushed" from the host system 
to the mobile data communication device upon the occurrence of one or more 
user-defined triggering events. 

There remains an additional need for such a system and method that 
provides flexibility in the types and quantities of user data items that are pushed 
from the host system to the mobile data communication device and that also 
provides flexibility in the configuration and types of events that can serve to 
trigger the redirection of the user data items. 

There remains yet an additional need for such a system and method that 
can operate locally on a user's desktop PC or at a distance via a network server. 

There remains still another need for such a system and method that 
provides for secure, transparent delivery of the user-selected data items from 
the host system to the mobile device. 



BNSDOC1D: <WO 9963709A2J_> 





WO 99/63709 



PCT/CA99/00494 



-4. 



S1TMMARY QF THE INVENTION 



10 



15 



20 



The present invention overcomes the problems noted above and satisfies 
the needs in this field for a system and method of pushing user-selected data 
items from a host system to a user's mobile data communication device upon 
detecting the occurrence of one or more user-defined event triggers. As used 
in this application, the term host system refers to the computer where the 
redirector software is operating. In the preferred embodiment of the present 
invention, the host system is a user's desktop PC, although, alternatively, the 
host system could be a network server connected to the user's PC via a local- 
area network ("LAN)", or could be any other system that is in communication 
with the user's desktop PC. 

A redirector program operating at the host system enables the user to 
redirect or mirror certain user-selected data items (or parts of data items) from 
the host system to the user's mobile data communication device upon detecting 
that one or more user-defined triggering events has occurred. Also operating 
at the host system are various sub-systems that can be configured to create 
triggering events, such as a screen saver sub-system or a keyboard sub- system, 
as well as sub-systems for repackaging the user's data items for transparent 
delivery to the mobile data device, such as a TCP/IP sub-system or one or more 
E-Mail sub-systems. Other sub-systems for creating triggering events and 
repackaging the user's data items could also be present at the host system. The 
host system also includes a primary memory store where the user's data items 
are normally stored. 

Using the redirector program, the user can select certain data items for 
redirection, such as E-mail messages, calendar events, meeting notifications, 
address entries, journal entries, personal reminders etc. Having selected the 
data items for redirection, the user can then configure one or more event 
triggers to be sensed by the redirector program to initiate redirection of the 
user data items. These user-defined trigger points (or event triggers) include 



BNSDOCtO <WO 9963709 A2_l_> 



WO 99/63709 PCT/CA 99/00494 



external events, internal events and networked events. Examples of external 
events include: receiving a message from the user's mobile data 
communication device to begin redirection; receiving a similar message from 
some external computer, sensing that the user is no longer in the vicinity of the 
5 host system; or any other event that is external to the host system. Internal 
events could be a calendar alarm, screen saver activation, keyboard timeout, 
programmable timer, or any other user-defined event that is internal to the host 
system. Networked events are user-defined messages that are transmitted to the 
host system from another computer coupled to the host system via a network 

10 to initiate redirection. These are just some of the examples of the types of user- 
defined events that can trigger the redirector program to push data items from 
the host to the mobile device. Although in the preferred embodiment it is 
anticipated that the configuration that specifies which data items will be 
redirected and in what form will be set at the host system, it is within the scope 

15 of this invention that such configuration may be set or modified through data 
sent from the mobile communications device. 

In addition to the functionality noted above, the redirector program 
provides a set of software-implemented control functions for determining the 
type of mobile data communication device and its address, for programming 

20 a preferred list of message types that are to be redirected, and for determining 
whether the mobile device can receive and process certain types of message 
attachments, such as word processor or voice attachments. The determination 
of whether a particular mobile device can receive and process attachments is 
initially configured by the user of that mobile device at the host system. This 

25 configuration can be altered on a global or per message basis by transmitting 
a command message from the mobile device to the host system. If the 
redirector is configured so that the mobile data device cannot receive and 
process word processor or voice attachments, then the redirector routes these 
attachments to an external machine that is compatible with the particular 



BNSDOCID: <WO 9963709 A2J_> 



WO 99/63709 PCT/CA99/00494 



attachment, such as an attached printer or networked fax machine or telephone. 
Other types of attachments could be redirected to other types of external 
machines in a similar fashion, depending upon the capabilities of the mobile 
device. For example, if a user is traveling and receives a message with an 
5 attachment that the user's mobile device can process or display, the user may 
from a mobile communications device send a command message to the host 
system indicating that that attachment is to be sent to a fax machine at a hotel 
where the user will be spending the evening. This enables the user to receive 
important E-mail attachments as long as the host system is provided with 
10 sufficient information about the destination where the attachment is to be 
forwarded. 

Once an event has triggered redirection of the user data items, the host 
system then repackages these items in a manner that is transparent to the mobile 
data communication device, so that information on the mobile device appears 

15 similar to information on the user's host system. The preferred repackaging 
method includes wrapping the user data items in an E-mail envelope that 
corresponds to the address of the mobile data communication device, although, 
alternatively, other repackaging methods could be used with the present 
invention, such as special-purpose TCP/IP wrapping techniques, or other 

20 methods of wrapping the user selected data items. The repackaging preferably 
results in E-mail messages generated by the user from the mobile device to be 
transmitted from the host system, thus enabling the user to appear to have a 
single E-mail address, such that the recipients of messages sent from the mobile 
communications device do not know where the user was physically located 

25 when the message was first sent. The repackaging also permits both messages 
to the mobile device and sent from the mobile device to be encrypted and 
decrypted as well as compressed and decompressed. 

In an alternative system and method, the redirector program executes on 
a network server, and the server is programmed to detect numerous redirection 



BNSDOCID: <WO 9963709A2J_> 



WO 99/63709 



PCT/CA99/00494 



event triggers over the network from multiple user desktop computers coupled 
to the server via a LAN. The server can receive internal event triggers from 
each of the user desktops via the network, and can also receive external event 
triggers, such as messages from the users' mobile data communication devices. 
5 In response to receiving one of these triggers, the server redirects the user's 
data items to the proper mobile data communication device. The user data 
items and addressing information for a particular mobile device can be stored 
at the server or at the user's PC. Using this alternative configuration, one 
redirector program can serve a plurality of users. This alternative configuration 

10 could also include an internet- or intranet-based redirector program that could 
be accessible through a secure webpage or other user interface. The redirector 
program could be located on an Internet Service Provider's system and 
accessible only through the Internet. 

In another alternative configuration of the present invention, a redirector 

15 program operates at both the host system and at the user's mobile data 
communication device. In this configuration, the user's mobile device operates 
similarly to the host system described below, and is configured in a similar 
fashion to push certain user-selected data items from the mobile device to the 
user's host system (or some other computer) upon detecting an event trigger at 

20 the mobUe device. This configuration provides two-way pushing of information 
from the host to the mobile device and from the mobile device to the host. 

The primary advantage of the present invention is that it provides a 
system and method for triggering the continuous and real-time redirection of 
user-selected data items from a host system to a mobile data communication 

25 device. Other advantages of the present^ invention include: (1) flexibility in 
defining the types of user data to redirect, and in defining a preferred list of 
message types that are to be redirected or preferred senders whose messages are 
to be redirected; (2) flexibility in configuring the system to respond to 
numerous internal, external and networked triggering events; (3) transparent 



BNSDOCID: <WO 9963?09A2.I_> 



WO 99/63709 PCT/CA99/00494 



repackaging of the user data items in a variety of ways such that the mobile 
data communication device appears as though it were the host system; (4) 
integration with other host system components such as E-mail, TCP/IP, 
keyboard, screen saver, webpages and certain programs that can either create 
5 user data items or be configured to provide trigger points; and (5) the ability to 
operate locally on a user's desktop system or at a distance via a network server. 

These are just a few of the many advantages of the present invention, 
as described in more detail below. As will be appreciated, the invention is 
capable of other and different embodiments, and its several details are capable 
10 of modifications in various respects, all without departing from the spirit of the 
invention. Accordingly, the drawings and description of the preferred 
embodiments set forth below are to be regarded as illustrative in nature and not 
restrictive. 

15 B R IEF DESCRIPTION OF THE DRAWINGS 

The present invention satisfies the needs noted above as will become 
apparent from the following description when read in conjunction with the 
accompanying drawings wherein: 

FIG. 1 is a system diagram showing the redirection of user data items 
2 0 from a user's desktop PC (host system) to the user's mobile data 
communication device, where the redirector software is operating at the user's 
desktop PC. 

FIG. 2 is a system diagram showing the redirection of user data items 
from a network server (host system) to the user's mobile data communication 
25 device, where the redirector software is operating at the server. 

FIG. 3 is a block diagram showing the interaction of the redirector 
software with other components of the host system in FIG. 1 (the user's desktop 
PC) to enable the pushing of information from the host system to the user's 
mobile data communication device. 



BNSOOCIO <WO 9963709A2J_> 



WO 99/63709 PCT/CA99/00494 



-9- 

FIG. 4 is a flow chart showing the steps carried out by the redirector 
software operating at the host system. 

FIG. 5 is a flow chart showing the steps carried out by the mobile data 
communication device to interface with the redirector software operating at the 
5 host system. 

DETAILED DESCRIPTION OF THE DRAWINGS 
Referring now to the drawings, FIG. 1 is an example system diagram 
showing the redirection of user data items (such as message A or C) from a user's 

10 office PC (host system) 10 to the user's mobile data communication device 24, 
where the redirector software 12 is operating at the user's PC. Message A in FIG. 
1 represents an internal message sent from desktop 26 to the user's host system 
10 via LAN 14. Message C in FIG. 1 represents an external message from a 
sender that is not directly connected to LAN 14, such as the user's mobile data 

15 communication device 24, some other user's mobile device (not shown), or any 
user connected to the Internet 18. Message C also represents a command message 
from the user's mobile data communication device 24 to the host system 10. As 
described in more detail in FIG. 3, the host system 10 preferably includes, along 
with the typical hardware and software associated with a workstation or desktop 

20 computer, the redirector program 12, a TCP/IP subsystem 42, a primary message 
store 40, an E-mail subsystem 44, a screen saver subsystem 48, and a keyboard 
subsystem 46. 

In FIG. 1, the host system 10 is the user's desktop system, typically 
located in the user's office. The host system 1 0 is connected to a LAN 14, which 
25 also connects to other computers 26, 28 that may be in the user's office or 
elsewhere. The LAN 14, in turn, is connected to a wide area network ("WAN") 
18, preferably the Internet, which is defined by the use of the Transmission 
Control Protocol/Internet Protocol ("TCP/IP") to exchange information, but 
which, alternatively could be any other type of WAN. The connection of the LAN 



BNSDOCID <WO 9963709A2J_> 



■ I 





PCT/CA99/00494 



WO 99/63709 



-10- 



10 



15 



20 



14 to the WAN 18 is via high bandwidth link 16, typically a Tl or T3 connection. 
The WAN 18 in turn is connected to a variety of gateways 20, via connections 32. 
A gateway forms a connection or bridge between the WAN 18 and some other 
type of network, such as an RF wireless network, cellular network, satellite 
network, or other synchronous or asynchronous land-line connection. 

In the example of FIG. 1, a wireless gateway 20 is connected to the 
Internet for communicating via wireless link 22 to a plurality of wireless mobile 
data communication devices 24. Also shown in FIG. 1 is machine 30, which could 
be a FAX machine, a printer, a system for displaying images (such as video) or a 
machine capable of processing and playing audio files, such as a voice mail system. 
The present invention includes the ability to redirect certain message attachments 
to such an external machine 30 if the redirector program configuration data 
reflects that the mobile device 24 cannot receive and process the attachments, or 
if the user has specified that certain attachments are not to be forwarded to mobile 
device 24, even if such device can process those attachments. By way of example, 
consider an E-mail sent to a user that includes three attachments - a word 
processing document, a video clip and an audio clip. The redirection program 
could be configured to send the text of the E-mail to the remote device, to send 
the word processing document to a networked printer located near the user, to 
send the video clip to a store accessible through a secure connection through the 
internet and to send the audio clip to the user's voice mail system. This example 
is not intended to limit the breadth and scope of the invention, but rather to 
illustrate the variety of possibilities embodied in the redirection concept. 

The preferred mobile data communication device 24 is a hand-held two- 
way wireless paging computer, a wirelessly enabled palm-top computer, a mobile 
telephone with data messaging capabilities, or a wirelessly enabled laptop 
computer, but could, alternatively be other types of mobile data communication 
devices capable of sending and receiving messages via a network connection 22. 
Although it is preferable for the system to operate in a two-way communications 



BNSOOCID: <WO 9963709A2_L> 



WO 99/63709 



PCT/CA99/00494 



-11- 

mode, certain aspects of the invention could be beneficially used in a "one and 
one-half' or acknowledgment paging environment, or even with a one-way paging 
system. The mobile data communication device 24 includes software program 
instructions that work in conjunction with the redirector program 12 to enable the 
5 seamless, transparent redirection of user-selected data items. FIG. 4 describes the 
basic method steps of the redirector program 12, and FIG. 5 describes the steps 
of the corresponding program operating at the mobile device 24. 

In an alternative embodiment of the present invention, not explicitly shown 
in the drawings, the mobile device 24 also includes a redirector program. In this 
10 embodiment, user selected data items can be replicated from the host to the mobile 
device and vice versa. The configuration and operation of the mobile device 24 
having a redirector program is similar to that described herein with respect to 
FIGs. 1-4. 

A user of the present invention can configure the redirector program 12 
15 to push certain user-selected data items to the user's mobile data communication 
device 24 when the redirector 12 detects that a particular user-defined event 
trigger (or trigger point) has taken place. User-selected data items preferably 
include E-mail messages, calendar events, meeting notifications, address entries, 
journal entries, personal alerts, alarms, warnings, stock quotes, news bulletins, 
2 0 etc., but could, alternatively, include any other type of message that is transmitted 
to the host system 10, or that the host system 10 acquires through the use of 
intelligent agents, such as data that is received after the host system 10 initiates a 
search of a database or a website or a bulletin board. In some instances, only a 
portion of the data item is transmitted to the mobile device 24 in order to minimize 
25 the amount of data transmitted via the wireless network 22. In these instances, the 
mobile device 24 can optionally send a command message to the host system to 
receive more or all of the data item if the user desires to receive it. 

Among the user-defined event triggers that can be detected by the 
redirector program 1 2 are in the preferred embodiment external events, internal 



WO 99/63709 



PCT/CA99/00494 



-12- 

events and networked events. External events preferably include: (1 ) receiving 
a command message (such as message C) from the user's mobile data 
communication device to begin redirection, or to execute some other command 
at the host, such as a command to enable the preferred list mode, or to add or 
5 subtract a particular sender from the preferred list; (2) receiving a similar message 
from some external computer; and (3) sensing that the user is no longer in the 
vicinity of the host system; although, alternatively, an external event can be any 
other detectable occurrence that is external to the host system. Internal events 
could be a calendar alarm, screen saver activation, keyboard timeout, 

10 programmable timer, or any other user-defined event that is internal to the host 
system. Networked events are user-defined messages that are transmitted to the 
host system from another computer coupled to the host system via a network to 
initiate redirection. These are just some of the events that could be used with the 
present invention to initiate replication of the user-selected data items from the 

15 host system 1 0 to the mobile device 24. 

FIG. 1 shows an E-mail message A being communicated over LAN 14 
from computer 26 to the user's desktop system 10 (also shown in FIG. 1 is an 
external message C, which could be an E-mail message from an Internet user, or 
could be a command message from the user's mobile device 24). Once the 

2 0 message A (or C) reaches the primary message store of the host system 10, it can 
be detected and acted upon by the redirection software 12. The redirection 
software 12 can use many methods of detecting new messages. The preferred 
method of detecting new messages is using Microsoft's ® Messaging API 
(MAPI), in which programs, such as the redirector program 12, register for 

25 notifications or 'advise syncs' when changes to a mailbox take place. Other 
methods of detecting new messages could also be used with the present invention. 

Assuming that the redirector program 12 is activated, and has been 
configured by the user (either through the sensing of an internal, network or 



BNSOOCID: <WO_ 9963709A2J_> 



WO 99/63709 



PCT/CA99/00494 



-13- 

extemal event) to replicate certain user data items (including messages of type A 
or C) to the mobile device 24, when the message A is received at the host system 
10, the redirector program 12 detects its presence and prepares the message for 
redirection to the mobile device 24. In preparing the message for redirection, the 
5 redirector program 12 could compress the original message A, could compress the 
message header, or could encrypt the entire message A to create a secure link to 
the mobile device 24. 

Also programmed into the redirector 12 is the address of the user's mobile 
data communication device 24, the type of device, and whether the device 24 can 
10 accept certain types of attachments, such as word processing or voice 
attachments. If the user's type of mobile device cannot accept these types of 
attachments, then the redirector 12 can be programmed to route the attachments 
to a fax or voice number where the user is located using an attached fax or voice 
machine 30. 

15 The redirector may also be programmed with a preferred list mode that is 

configured by the user either at the host system 10, or remotely from the user's 
mobile data communication device by transmitting a command message C. The 
preferred list contains a list of senders (other users) whose messages are to be 
redirected or a list of message characteristics that determine whether a message 

20 is to be redirected. If activated, the preferred list mode causes the redirector 
program 12 to operate like a filter, only redirecting certain user data items based 
on whether the data item was sent from a sender on the preferred list or has 
certain message characteristics that if present will trigger or suppress redirection 
of the message. In the example of FIG. 1. if desktop system 26 was operated by 

25 a user on the preferred list of host system 10, and the preferred list option was 
activated, then message A would be redirected. If, however, desktop 26 was 
operated by a user not on the host system's preferred list, then message A would 
not be redirected, even if the user of the host system had configured the redirector 
to push messages of type A. The user of the host system 10 can configure the 



WO 99/63709 PCT/CA99/00494 



-14- 

prefenred list directly from the desktop system, or, alternatively, the user can then 
send a command message (such as C) from the mobile device 24 to the desktop 
system 10 to activate the preferred list mode, or to add or delete certain senders 
or message characteristics from the preferred list that was previously configured. 
5 It should be appreciated that a redirection program could combine message 
characteristics and preferred sender lists to result in a more finely-tuned filter. 
Messages marked as low priority or that are simple return receipts or message 
read receipts, for example, could always be suppressed from redirection while 
messages from a particular sender would always be redirected. 

10 After the redirector has determined that a particular message should be 

redirected, and it has prepared the message for redirection, the software 12 then 
sends the message A to a secondary memory store located in the mobile device 24, 
using whatever means are necessary. In the preferred embodiment this method is 
to send the message A back over the LAN 14, WAN 1 8, and through the wireless 

15 gateway 20 to the mobile data communication device 24. In doing so, the 
redirector preferably repackages message A as an E-mail with an outer envelope 
B that contains the addressing information of the mobile device 24, although 
alternative repackaging techniques and protocols could be used, such as a TCP/IP 
repackaging and delivery method (most commonly used in the alternative server 

20 configuration shown in FIG.2). The wireless gateway 20 requires this outer 
envelope information B in order to know where to send the redirected message 
A. Once the message (A in B) is received by the mobile device 24, the outer 
envelope B is removed and the original message A is placed in the secondary 
memory store within the mobile device 24. By repackaging and removing the 

25 outer envelope in this manner, the present invention causes the mobile computer 
24 to appear to be at the same physical location as the host system 10, thus 
creating a transparent system. 

In the case where message C is representative of an external message from 
a computer on the Internet 18 to the host system 10, and the host 10 has been 



BNSDOC1D: <WO 9963709A2_L> 



WO 99/63709 PCT/CA99/00494 



-15- 

configured to redirect messages of type C, then in a similar manner to message A, 
message C would be repackaged with an outer envelope B and transmitted to the 
user's mobile device 24. In the case where message C is representative of a 
command message from the user's mobile device 24 to the host system 10, the 
5 command message C is not redirected, but is acted upon by the host system 10. 

If the redirected user data item is an E-mail message, as described above, 
the user at the mobile device 24 sees the original subject, sender's address, 
destination address, carbon copy and blind carbon copy. When the user replies to 
this message, or when the user authors a new message, the software operating at 

10 the mobile device 24 adds a similar outer envelope to the reply message (or the 
new message) to cause the message to be routed first to the user's host system 10, 
which then removes the outer envelope and redirects the message to the final 
destination, such as back to computer 26. In the preferred embodiment, this 
results in the outgoing redirected message from the user's host system 10 being 

15 sent using the E-mail address of the host mailbox, rather than the address of the 
mobile device, so that it appears to the recipient of the message that the message 
originated from the user's desktop system 10 rather than the mobile data 
communication device. Any replies to the redirected message will then be sent to 
the desktop system 10, which if it is still in redirector mode, will repackage the 

2 0 reply and resend it to the user's mobile data device, as described above. 

FIG. 2 is an alternative system diagram showing the redirection of user 
data items from a network server 1 1 to the user's mobile data communication 
device 24, where the redirector software 12 is operating at the server 1 1. This 
configuration is particularly advantageous for use with message servers such as 

25 Microsoft's ® Exchange Server, which is normally operated so that all user 
messages are kept in one central location or mailbox store on the server instead 
of in a store within each user's desktop PC. This configuration has the additional 
advantage of allowing a single system administrator to configure and keep track 



BMSDOCID. <WO 9963709A2_L> 





WO 99/63709 



PCT/CA99/00494 



-16- 



of all users having messages redirected. If the system includes encryption keys, 
these too can be kept at one place for management and update purposes. 

In this alternative configuration, server 1 1 preferably maintains a user 
profile for each user's desktop system 10, 26, 28, including information such as 
5 whether a particular user can have data items redirected, which types of message 
and information to redirect, what events will trigger redirection, the address of the 
users' mobile data communication device 24, the type of mobile device, and the 
user's preferred list, if any. The event triggers are preferably detected at the user's 
desktop system 10, 26, 28 and can be any of the external, internal or network 

10 events listed above. The desktop systems 10, 26, 28 preferably detect these 
events and then transmit a message to the server computer 1 1 via LAN 14 to 
initiate redirection. Although the user data items are preferably stored at the 
server computer 1 1 in this embodiment, they could, alternatively, be stored at each 
user's desktop system 10, 26, 28, which would then transmit them to the server 

15 computer 1 1 after an event has triggered redirection. 

As shown in FIG. 2, desktop system 26 generates a message A that is 
transmitted to and stored at the host system 1 1, which is the network server 
operating the redirector program 12. The message A is for desktop system 10, 
but in this embodiment, user messages are stored at the network server 1 1 . When 

20 an event occurs at desktop system 10, an event trigger is generated and 
transmitted to the network server 1 1, which then determines who the trigger is 
from, whether that desktop has redirection capabilities, and if so, the server 
(operating the redirector program) uses the stored configuration information to 
redirect message A to the mobile computer 24 associated with the user of desktop 

25 system 10. 

As described above with reference to FIG. 1, message C could be either 
a command message from a user's mobile data communication device 24, or it 
could be a message from an external computer, such as a computer connected to 
the Internet 18. If the message C is from an Internet computer to the user's 



BNSDOCIO <WO 9963709A2_I_> 





PCT/CA99/00494 



WO 99/63709 



-17- 



10 



15 



20 



desktop system 10, and the user has redirection capabilities, then the server 11 
detects the message C, repackages it using electronic envelope B, and redirects the 
repackaged message (C in B) to the user's mobile device 24. If the message C is 
a command message from the user's mobile device 24, then the server 1 1 simply 
acts upon the command message. 

Turning now to FIG. 3, a block diagram showing the interaction of the 
redirector software 12 with additional components of the host system 10 of FIG. 
1 (the desktop PC) to enable more fully the pushing of information from the host 
system 10 to the user's mobile data communication device 24 is set forth. These 
additional components are illustrative of the type of event-generating systems that 
can be configured and used with the redirector software 12, and of the type of 
repackaging systems that can be used to interface with the mobile communication 
device 24 to make it appear transparent to the user. 

The desktop system 10 is connected to LAN 14, and can send and receive 
data, messages, signals, event triggers, etc., to and from other systems connected 
to the LAN 14 and to external networks 18, 22, such as the Internet or a wireless 
data network, which are also coupled to the LAN 14. In addition to the standard 
hardware, operating system, and application programs associated with a typical 
microcomputer or workstation, the desktop system 10 includes the redirector 
program 12, a TCP/IP sub-system 42, an E-mail sub-system 44, a primary data 
storage device 40, a screen saver sub-system 48, and a keyboard sub-system 46. 
The TCP/IP and E-mail subsystems 42, 44 are examples of repackaging systems 
that can be used to achieve the transparency of the present invention, and the 
screen saver and keyboard sub-systems 46, 48 are examples of event generating 
systems that can be configured to generate event messages or signals that trigger 
redirection of the user selected data items. 

The method steps carried out by the redirector program 12 are described 
in more detail in FIG. 4. The basic functions of this program are: (1) configure 
and setup the user-defined event trigger points that will start redirection; (2) 



BNSDOCID: <WO 9963709A2J_> 




WO 99/63709 



PCT/CA99/00494 



-18- 



10 



15 



20 



configure the types of user data items for redirection and optionally configure a 
preferred list of senders whose messages are to be redirected; (3) configure the 
type and capabilities of the user's mobile data communication device; (4) receive 
messages and signals from the repackaging systems and the event generating 
systems; and (5) command and control the redirection of the user-selected data 
items to the mobile data communication device via the repackaging systems. 
Other functions not specifically enumerated could also be integrated into this 
program. 

The E-Mail sub-system 44 is the preferred link to repackaging the user- 
selected data items for transmission to the mobile data communication device 24, 
and preferably uses industry standard mail protocols, such as SMTP, POP, IMAP, 
MIME and RFC-822, to name but a few. The E-Mail sub-system 44 can receive 
messages A from external computers on the LAN 14, or can receive messages C 
from some external network such as the Internet 18 or a wireless data 
communication network 22, and stores these messages in the primary data store 
40. Assuming that the redirector 12 has been triggered to redirect messages of 
this type, the redirector detects the presence of any new messages and instructs 
the E-Mail system 44 to repackage the message by placing an outer wrapper B 
about the original message A (or C), and by providing the addressing information 
of the mobile data communication device 24 on the outer wrapper B. As noted 
above, this outer wrapper B is removed by the mobile device 24, and the original 
message A (or C) is then recovered, thus making the mobile device 24 appear to 
be the desktop system 10. 

In addition, the E-Mail sub-system 44 receives messages back from the 
mobile device 24 having an outer wrapper with the addressing information of the 
desktop system 10, and strips this information away so that the message can be 
routed to the proper sender of the original message A (or C). The E-Mail sub- 
system also receives command messages C from the mobile device 24 that are 
directed to the desktop system 10 to trigger redirection or to carry out some other 



BNSOOCID <WO 9963709A2J_> 



WO 99/63709 PCT/CA99/00494 



-19- 

function. The functionality of the E-Mail sub-system 44 is controlled by the 
redirector program 12. 

The TCP/TP sub-system 42 is an alternative repackaging system. It 
includes all of the functionality of the E-Mail sub-system 44, but instead of 
5 repackaging the user-selected data items as standard E-mail messages, this system 
repackages the data items using special-purpose TCP/IP packaging techniques. 
This type of special-purpose sub-system is useful in situations where security and 
improved speed are important to the user. The provision of a special-purpose 
wrapper that can only be removed by special software on the mobile device 24 

10 provides the added security, and the bypassing of E-mail store and forward 
systems can improve speed and real-time delivery. 

As described previously, the present invention can be triggered to begin 
redirection upon detecting numerous external, internal and networked events, or 
trigger points. Examples of external events include: receiving a command 

15 message from the user's mobile data communication device 24 to begin 
redirection; receiving a similar message from some external computer; sensing 
that the user is no longer in the vicinity of the host system; or any other event that 
is external to the host system. Internal events could be a calendar alarm, screen 
saver activation, keyboard timeout, programmable timer, or any other user-defined 

20 event that is internal to the host system. Networked events are user-defined 
messages that are transmitted to the host system from another computer that is 
connected to the host system via a network to initiate redirection. 

The screen saver and keyboard sub-systems 46, 48 are examples of 
systems that are capable of generating internal events. Functionally, the redirector 

25 program 12 provides the user with the ability to configure the screen saver and 
keyboard systems so that under certain conditions an event trigger will be 
generated that can be detected by the redirector 12 to start the redirection process. 
For example, the screen saver system can be configured so that when the screen 
saver is activated, after, for example, 10 minutes of inactivity on the desktop 



BNSDOCID: <WO 9963709A£_L> 



WO 99/63709 PCT/CA99/00494 



-20- 

system, an event trigger is transmitted to the redirector 12, which starts redirecting 
the previously selected user data items. In a similar manner the keyboard sub- 
system can be configured to generate event triggers when no key has been 
depressed for a particular period of time, thus indicating that redirection should 
5 commence. These are just two examples of the numerous application programs 
and hardware systems internal to the host system 1 0 that can be used to generate 
internal event triggers. 

FTGs. 4 and 5, set forth, respectively, flow charts showing the steps carried 
out by the redirector software 12 operating at the host system 10, and the steps 

10 carried out by the mobile data communication device 24 in order to interface with 
the host system. Turning first to FIG. 4, at step 50, the redirector program 12 is 
started and initially configured. The initial configuration of the redirector 12 
includes: (1) defining the event triggers that the user has determined will trigger 
redirection; (2) selecting the user data items for redirection; (3) selecting the 

15 repackaging sub-system, either standard E-Mail, or special-purpose technique; (4) 
selecting the type of data communication device, indicating whether and what type 
of attachments the device is capable of receiving and processing, and inputting the 
address of the mobile device; and (5) configuring the preferred list of user selected 
senders whose messages are to be redirected. 

20 FIG. 4 sets forth the basic steps of the redirector program 12 assuming it 

is operating at a desktop system 10, such as shown in FIG. 1 . If the redirector 12 
is operating at a network server 11, as shown in FIG. 2, then additional 
configuration steps may be necessary to enable redirection for a particular 
desktop system 10, 26, 28 connected to the server, including: (1) setting up a 

25 profile for the desktop system indicating its address, events that will trigger 
redirection, and the data items that are to be redirected upon detecting an event; 
(2) maintaining a storage area at the server for the data items; and (3) storing the 
type of data communication device to which the desktop system's data items are 



BNSOOCID: «WO 9963709A2J_> 




WO 99/63709 PCT/CA99/00494 



-21- 

to be redirected, whether and what type of attachments the device is capable of 
receiving and processing, and the address of the mobile device. 

Once the redirector program is configured 50, the trigger points (or event 
triggers) are enabled at step 52. The program 12 then waits 56 for messages and 
5 signals 54 to begin the redirection process. A message could be an E-Mail 
message or some other user data hem than may have been selected for redirection, 
and a signal could be a trigger signal, or could be some other type of signal that 
has not been configured as an event trigger. When a message or signal is detected, 
the program determines 58 whether it is one of the trigger events that has been 

10 configured by the user to signal redirection. If so, then at step 60 a trigger flag is 
set, indicating that subsequently received user data items (in the form of messages) 
that have been selected for redirection should be pushed to the user's mobile data 
communication device 24. 

If the message or signal 54 is not a trigger event, the program then 

15 determines at steps 62, 68 and 66 whether the message is, respectively, a system 
alarm 62, an E-Mail message 64, or some other type of information that has been 
selected for redirection. If the message or signal is none of these three items, then 
control returns to step 56, where the redirector waits for additional messages 54 
to act upon. If, however the message is one of these three types of information, 

2 0 then the program 12 determines, at step 68, whether the trigger flag has been set, 
indicating that the user wants these items redirected to the mobile device. If the 
trigger flag is set, then at step 70, the redirector 12 causes the repackaging system 
(E-Mail or TCP/IP) to add the outer envelope to the user data item, and at step 
72 the repackaged data item is then redirected to the user's mobile data 

2 5 communication device 24 via LAN 1 4, WAN 1 8, wireless gateway 20 and wireless 
network 22. Control then returns to step 56 where the program waits for 
additional messages and signals to act upon. Although not shown explicitly in 
FIG. 4, after step 68, the program could, if operating in the preferred list mode, 
determine whether the sender of a particular data item is on the preferred list, and 



BNSOOCID: <WO 9963709A2_I_> 





WO 99/63709 



PCT/CA99/00494 



-22- 



if not, then the program would skip over steps 70 and 72 and proceed directly 
back to step 56. If the sender was on the preferred list, then control would 
similarly pass to steps 70 and 72 for repackaging and transmission of the message 
from the preferred list sender. 



communication device 24 in order to interface to the redirector program 12 of 
the present invention. At step 80 the mobile software is started and the mobile 
device 24 is configured to operate with the system of the present invention, 
including, for example, storing the address of the user's desktop system 10. 



generated or received. Assuming that the redirector software 12 operating at 
the user's desktop system 10 is configured to redirect upon receiving a message 
from the user's mobile device 24, at step 86, the user can decide to generate a 
command message that will start redirection. If the user does so, then at step 

15 88 the redirection message is composed and sent to the desktop system 10 via 
the wireless network 22, through the wireless gateway 20, via the Internet 18 
to the LAN 14, and is finally routed to the desktop machine 10. In this 
situation where the mobile device 24 is sending a message directly to the 
desktop system 10, no outer wrapper is added to the message (such as message 

20 C in FIGs. 1 and 2). In addition to the redirection signal, the mobile device 24 
could transmit any number of other commands to control the operation of the 
host system, and in particular the redirector program 12. For example, the 
mobile 24 could transmit a command to put the host system into the preferred 
list mode, and then could transmit additional commands to add or subtract 

25 certain senders from the preferred list. In this manner, the mobile device 24 
can dynamically limit the amount of information being redirected to it by 
minimizing the number of senders on the preferred list. Other example 
commands include: (1) a message to change the configuration of the host 
system to enable the mobile device 24 to receive and process certain 



5 



FIG. 5 sets forth the method steps carried out by the user's mobile data 



10 



At step 82, the mobile device waits for messages and signals 84 to be 



BNSOOCID: <WO 9963709A2_I_> 



WO 99/63709 PCT/CA99/00494 



-23- 

attachments; and (2) a message to instruct the host system to redirect an entire 
data item to the mobile device in the situation where only a portion of a 
particular data item has been redirected. 

Turning back to FIG. 5, if the user signal or message is not a direct 
5 message to the desktop system 10 to begin redirection (or some other 
command), then control is passed to step 90, which determines if a message has 
been received. If a message is received by the mobile, and it is a message from 
the user's desktop 10, as determined at step 92, then at step 94 a desktop 
redirection flag is set "on* for this message, and control passes to step 96 where 
10 the outer envelope is removed. Following step 96, or in the situation where the 
message is not from the user's desktop, as determined at step 92, control passes 
to step 98, which displays the message for the user on the mobile device's 
display. The mobile unit 24 then returns to step 82 and waits for additional 
messages or signals. 

15 If the mobile device 24 determines that a message has not been received 

at step 90, then control passes to step 100, where the mobile determines 
whether there is a message to send. If not, then the mobile unit returns to step 
82 and waits for additional messages or signals. If there is at least one message 
to send, then at step 102 the mobile determines whether it is a reply message 

20 to a message that was received by the mobile unit. If the message to send is a 
reply message, then at step 108, the mobile determines whether the desktop 
redirection flag is on for this message. If the redirection flag is not on, then at 
step 106 the reply message is simply transmitted from the mobile device to the 
destination address via the wireless network 22. If, however, the redirection 

25 flag is on, then at step 110 the reply message is repackaged with the outer 
envelope having the addressing information of the user's desktop system 10, 
and the repackaged message is then transmitted to the desktop system 10 at step 
106. As described above, the redirector program 12 executing at the desktop 
system then strips the outer envelope and routes the reply message to the 



BNSOOCID: <WO 9963709A2_I_> 





WO 99/63709 



PCT/CA99/00494 



-24- 



10 



15 



20 



appropriate destination address using the address of the desktop system as the 
"from" field, so that to the recipient of the redirected message, it appears as 
though it originated from the user's desktop system rather than the mobUe data 
communication device. 

If, at step 102, the mobile determines that the message is not a reply 
message, but an original message, then control passes to step 104, where the 
mobile determines if the user is using the redirector software 12 at the desktop 
system 10, by checking the mobile unit's configuration. If the user is not using 
the redirector software 12, then the message is simply transmitted to the 
destination address at step 106. If, however, the mobile determines that the 
user is using the redirector software 12 at the desktop system 10, then control 
passes to step 110, where the outer envelope is added to the message. The 
repackaged original message is then transmitted to the desktop system 10 at step 
106, which, as described previously, strips the outer envelope and routes the 
message to the correct destination. Following transmission of the message at 
step 106, control of the mobile returns to step 82 and waits for additional 
messages or signals. 

Having described in detail the preferred embodiments of the present 
invention, including the preferred methods of operation, it is to be understood 
that this operation could be carried out with different elements and steps. This 
preferred embodiment is presented only by way of example and is not meant to 
limit the scope of the present invention which is defined by the following 
claims. 



BNSDOCID: <WO 9963709 A2_l_> 



WO 99/63709 



PCT/CA99/00494 



-25- 

What is claimed: 

1. A method of pushing data items from a host system to a mobile data 
communication device comprising the steps of: 

5 detecting an event trigger at the host system; and 

in response to detecting the event, continuously redirecting the data items 
from the host system to the mobile data communication device. 

2. The method of claim 1, further comprising the step of: 

10 selecting at least one type of data item to redirect from the host system to 

the mobile data communication device. 

3. The method of claim 1, further comprising the step of: 

selecting particular event triggers that will cause the host system to begin 
15 redirecting the data items. 

4. The method of claim 1, further comprising the step of: 

providing information regarding the configuration of the mobile data 
communication device. 

20 

5. The method of claim 4, wherein the configuration information includes: 
the address of the mobile data communication device. 

6. The method of claim 4, wherein the configuration information includes: 
25 the type of mobile data communication device. 



7. 

device 



The method of claim 4, wherein the configuration information includes: 
the types of data item attachments that the mobile data communication 
can receive and process. 



WO 99/63709 PCT/CA99/00494 



-26- 

8. The method of claim 5, further comprising the step of: 
repackaging the data items prior to redirection to the mobile data 

communication device by placing the data items in an electronic wrapper 
addressed using the address information of the mobile data communication device. 

5 

9. The method of claim 7, further comprising the steps of: 

for each data item to be redirected, determining whether the data item 
includes an attachment, and determining the type of attachment; 

determining whether the mobile data communication device can receive 
10 and process such attachments; and 

if so, then redirecting the attachments to the mobile data communication 
device, and if not, then redirecting the attachments to an external machine that is 
compatible with the attachment. 

15 10. The method of claim 9, wherein the type of attachment is a sound file. 

1 1 . The method of claim 3, wherein the event triggers include external events, 
internal events, or networked events. 

20 12. The method of claim 11, wherein the external event is a message from the 
mobile data communication device to start redirection. 

13. The method of claim 1 1, wherein the internal event is a calendar alarm. 

25 14. The method of claim 11, wherein the internal event is a screen saver 
activation. 

15. The method of claim 11, wherein the internal event is a keyboard timeout 
signal. 



BNSDOCID: <WO 9963709 A2_l_> 



WO 99/63709 PCT/CA99/00494 



-27- 

16. The method of claim 11, wherein the networked events include messages 
to begin redirection from computer systems connected to the host system via a 
network. 

5 17. The method of claim 8, further including the steps of: 

receiving the repackaged data items at the mobile data communication 
device; and 

removing the electronic wrapper from the data items and storing them at 
the mobile device. 

10 

18. The method of claim 15, further including the steps of: 

providing the address of the host system to the mobile data communication 

device; 

generating a reply data item at the mobile data communication device in 
15 response to a data item received from the host system; and 

repackaging the reply data item by placing it in an electronic wrapper 
addressed using the address information of the host system. 

19. The method of claim 1, wherein the mobile data communication device is 
20 a pager. 

20. The method of claim 1, wherein the mobile data communication device 
is a device equipped to receive both voice and non-voice data messages. 

25 21. The method of claim 1, wherein the host system includes a preferred list 
for limiting the redirection step to redirecting only those data items that are 
transmitted to the host system from a sender on the preferred list. 



BNSOOCID: <WO 9963709A2_I_> 



WO 99/63709 PCT/CA99/00494 



-28- 

22. The method of claim 21, wherein a user can add and subtract senders from 
the preferred list. 

23. The method of claim 21, wherein the preferred list is activated and 
5 deactivated at the host system. 

24. The method of claim 21, wherein the preferred list is activated and 
deactivated by a command message transmitted from the mobile data 
communication device to the host system. 

10 

25. The method of claim 22, wherein the user can add and subtract senders 
from the preferred list by configuring the host system. 

26. The method of claim 22, wherein the user can add and subtract senders 
15 from the preferred list by transmitting a command message from the mobile data 

communication device to the host system. 



27. A method of replicating data between a first system and a second system 
20 comprising: 

establishing a first set of data elements at the first system as subject to 
replication with a corresponding set of data elements at the second system; 

detecting an event trigger has occurred at the first system; 

providing an indication of the data element in the first set of data that has 
25 changed to the second system by placing information in an electronic wrapper 
delivered to the second system as part of a data transfer transaction; 

initiating the data transfer transaction thereby transferring the electronic 
wrapper to the second system; 

receiving the electronic wrapper at the second system; 



BNSDOCID: <WO 9963709A2_I_> 



WO 99/63709 PCT/CA99/00494 



-29- 

processing the electronic wrapper; and 

updating each element in the corresponding set of data elements that 
requires updating as a result of the change in the data element in the first set of 
data elements. 

5 

28. The method of claim 27, wherein the first system is a host computer and 
the second system is a hand held electronic device. 

29. The method of claim 27, wherein the first system is a hand held electronic 
10 device and the second system is a host computer. 

30. The method of claim 27, wherein the data transaction is an electronic 
message sent from the first system through a data network to the second system. 

15 31. The method of claim 27, wherein the first set of data elements is a set of 
calendar entries. 

32. The method of claim 27, wherein the first set of data elements is a set of 
address book entries. 

20 

33. The method of claim 30, wherein the electronic wrapper includes an 
attachment to the electronic message. 

34. The method of claim 30, wherein the electronic message is an e-mail 
25 message and the data network is the Internet. 

35. The method of claim 27, wherein the method includes a step of receiving 
from the second system a request to begin replication. 



BNSOOCID: <WO 9963709A2_I_> 



WO 99/63709 PCT/CA99/00494 



-30- 

36. The method of claim 35, wherein the method includes a step of processing 
the request to begin replication. 

37. The method of claim 27, wherein the second system can limit the 
5 information being sent to it by sending a command to the first system. 

38. A method of remotely controlling a host system from a personal 
communications device comprising the steps of: 

establishing at the host system a set of commands that can be invoked to 
10 require the host system to act in response to invocation of any such command; 

sending from the personal communications device a direction to the host 
system to invoke a command from the set of commands; 
invoking the command at the host system; and 
processing the command so that the host responds to the command. 

15 

39. The method of claim 38, wherein at least one command is a direction to 
continuously redirect certain data elements from the host system to the personal 
communications system. 

20 40. The method of claim 38, wherein the host system provides an indication 
that data has been redirected. 

41. The method of claim 38, wherein the data elements that have been 
redirected are marked at the host system as redirected. 

25 

42. The method of claim 38 comprising the further step of transmitting from 
the personal communications device to host device an acknowledgment that the 
personal communications device is receiving data redirected from the host system. 



6NSOOCID: <WO 9963709 A2J_> 



WO 99/63709 



PCT/CA99/00494 



-31- 

43. The method of claim 38, wherein the personal communication device can 
limit the information being sent to it by transmitting a command to the host device. 

44. A system for pushing information from a host system to a mobile data 
5 communication device, comprising: 

a communications network over which the host system and the mobile data 
communications device can communicate; 
a redirector program comprising: 

software instruction means for prompting a user to select certain 
10 data items of information to be pushed to the mobile device; 

software instruction means for defining one or more events that 
will trigger the system to begin pushing the selected information; and 

software instruction means for detecting the occurrence of the one 
or more events and for pushing the selected data items of information from the 
15 host system to the mobile data communication device via the network; and 

a software program operating at the mobile data communications device 
for receiving the data items of information from the host system. 

45. The system of claim 44, wherein the redirector program is operating at the 
20 host system. 

46. The system of claim 44, further comprising: 

a network server in communication with the host system, and wherein the 
redirector program is operating at the network server. 

25 

47. The system of claim 44, further comprising a preferred list stored at the 
host system for limiting the pushing of selected data items to those items that were 
sent to the host system from a sender on the preferred list. 



BNSDOCID: <WO 9963709A2_I_> 



WO 99/63709 PCT/CA99/00494 



1/5 



28 





DESKTOP 


S 




tQMPUTER 

— >>> 




REDIRECTION SOFTWARE 









IS 



WIRELESS 
GATEWAY 



MOBILE 
COMPUTER 



Fig. 1 



12 



30 



FAX OR VOICE 
MACHINE 



BNSDOCID: <WO 9963709A2_L> 



WO 99/63709 PCT/CA99/00494 

2/5 




LOCAL AREA NETWORK 



12 



Jt 

<* 1 » 





SERVER 
COMPUTER 




REDIRECTION SERVER-''' 
SOFJKAflE-" " i 


/ i 

i 

t 

4 , 


i 
\ 

i 

i 

' Y 






c 



INTERNET NETWORK 



18- 



20 



32 



WIRELESS 
C l GATEWAY 



30 



FAX OR VOICE 
MACHINE 



B 

32: 




MOBILE 
COMPUTER 



24 



Fig. 2 



BNSDOCID: <WO 9963709A2 I > 



WO 99/63709 



PCT/CA99/00494 



3/5 



14 



LOCAL AREA NETWORK (LAN) 




^-10 


42 ~\ 




^-40 


^-44 



TCP/IP 




SUB-SYSTEM 





PRIMARY STORE 



ALTERNATE LINK 





E-MAIL 




SUB-SYSTEM 



MAIN LINK 



RED I RECTOR 
PR06RAM 




12 



SETUP EVENTS 
TRIGGER 



SETUP EVENTS 
TRIGGER 



48 



SCREEN SAVER 
SUB-SYSTEM 



46 



KEYBOARO 
SUB-SYSTEM 



DESKTOP COMPUTER 



Fig. 3 



BNSOOCID: <WO 9963709A2J_> 



WO 99/63709 PCT/CA99/00494 

4/5 



REDIRECTION 
SOFTWARE 
STARTED 



j- 50 



INSTALL TRIG6ER 
POINTS IN 
SYSTEM 



^54 

MESSAGE AND 
SIGNALS 



S 



53 



56 



WAIT FOR 

MESSAGES AND- 
SIGNALS 



FORWARO 
TO USER 



ADD OUTER 
ENVELOPE 



z: 



60 



SET TRIGGER 
FIREO FLAG 




Fig. 



BNSDOCID <WO 9963709A2J_> 



WO 99/63709 



PCT/CA99/00494 



5/5 



^84 

MESSAGE AND 
SIGNALS 



r 



80 



MOBILE 
SOFTWARE 
STARTEO 



r 



88 



COMPOSE ANO 
SENO TO DESKTOP 



WAIT FOR 
MESSAGES ANO 
SIGNALS 



98 



1 



PRESENT 
TO USER 



96 




REMOVE 
OUTER 
ENVELOPE 


94 ? - 


YES 


t 




SET DESKTOP 
REDIRECTION 
FLAG ON 












SEND TO 
DESTINATION 
ADDRESS 



PUT OUTER ENVELOPE 

ON MESSAGE AND 
ADDRESS TO OESKTOP 



Fig. 5 



BNSOOCID: <WO 9963709A2J_> 



WORLD INTELLECTUAL PROPERTY ORGANIZATION 
international Bureau 




PCT 

INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) 



(51) International Patent Classification 6 : 
H04L 12/28, 29/06 



A3 



(11) International Publication Number: WO 99/63709 

(43) International Publication Date: 9 December 1999 (09.12.99) 



(21) International Application Number: PCT/CA99/00494 

(22) International Filing Date: 28 May 1999 (28.05.99) 



(30) Priority Data: 

09/087,623 



29 May 1998 (29.05.98) 



US 



(71) Applicant: RESEARCH IN MOTION LIMITED [CA/CA]; 

295 Phillip Street, Waterloo, Ontario N2L 3W8 (CA). 

(72) Inventors: MOUSSEAU, Gary, P.; 523B Rosemeadow Cres- 

cent, Waterloo, Ontario N2T 1Z9 (CA). LAZARIDIS, Mi- 
hal; 272 Northerest Place, Waterloo, Ontario N2J 3X5 (CA). 

(74) Agent: PERRY. Stephen, J.; Sim & McBurney. 6th floor, 330 
University Avenue, Toronto, Ontario M5G 1R7 (CA). 



(81) Designated States: AE, AL, AM, AT, AU, AZ, BA. BB, BG, 
BR, BY, CA, CH, CN, CU. CZ, DE, DK. EE ES, FI. GB, 
GD, GE. GH. GM. HR. HU, ID, IL. IN, IS. JP. K£. KG, 
KP. KR, KZ, LC, LK, LR. LS. LT, LU f LV, MD. MG, MK. 
MN„ MW, MX, NO, NZ, PL, PT. RO. RU, SD. SE, SG. SI, 
SK, SL, TJ, TM, TR. TT, UA, UG, UZ, VN, YU. ZA, ZW, 
ARIPO patent (GH, GM, KE, LS, MW, SD, SL, SZ, UG. 
ZW), Eurasian patent (AM, AZ, BY, KG, KZ, MD, RU. TJ, 
TM), European patent (AT, BE, CH, CY, DE, DK, ES. FI, 
FR, GB, GR. IE, IT. LU. MC, NL, PT. SE), OAP1 patent 
(BF. BJ, CF, CG, CI, CM, GA, GN, GW, ML, MR, NE, 
SN. TD, TG). 

Published 

With international search report. 

Before the expiration of the time limit for amending the claims 
and to be republished in the event of the receipt of amendments. 

(88) Date of publication of the international search report: 

13 April 2000 (13.04.00) 



(54) Title: SYSTEM AND METHOD FOR PUSHING INFORMATION FROM A HOST SYSTEM TO A MOBILE DATA COMMU- 
NICATION DEVICE 



(57) Abstract 

A system and method for pushing infor- 
mation from a host system to a mobile data 
communication device upon sensing a triggering 
event is disclosed. A redirector program operat- 
ing at the host system enables a user to contin- 
uously redirect certain user-selected data items 
from the host system to the user's mobile data 
communication device upon detecting that one 
or more user-defined triggering events has oc- 
cured. The redirector program operates in con- 
nection with event generating applications and 
repackaging systems at the host system to con- 
figure and detect a particular user-defined event, 
and then to repackage the user-selected data 
items in an electronic wrapper prior to pushing 
the data items to the mobile device. 





LOCAL AREA NETWORK 
(LAN) ,< 



16 



2, 




/ 



OESKTOP 
rOMPUTER 



U 



10 



REDIRECTION SOFTWARE 



15 



12 



/ 



\ 



r 



30 



FAX OR VOICE 
MACHINE 



INTERNET NETWORK 

_32 r ll 



32 



r 



24 



WIRELESS 




MOBILE 


GATEWAY 




COMPUTER 



BNSDOCID: <WO 9963709A3_I_> 




FOR THE PURPOSES OF INFORMATION ONLY 
Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT. 



AL 


Albania 


ES 


Spain 


LS 


Lesotho 


SI 
SK 


Slovenia 


AM 


Armenia 


FI 


Finland 


LT 


Lh*uanta 


Slovakia 


AT 


Austria 


FR 


France 


LU 


Luxembourg 


SN 


Senegal 


AU 


Australia 


GA 


Gabon 


LV 


Latvia 


SZ 


Swaziland 


AZ 


Azerbaijan 


GB 


United Kingdom 


MC 


Monaco 


TD 


Chad 


BA 


Bosnia and Herzegovina 


GE 


Georgia 


MD 


Republic of Moldova 


TG 


Togo 


BB 


Barbados 


GH 


Ghana 


MG 


Madagascar - 


TJ 


Tajikistan 


BE 


Belgium 


GN 


Guinea 


MK 


The former Yugoslav 


TM 


Turkmenistan 


BF 


Burkina Faso 


GR 


Greece 




Republic of Macedonia 


TR 


Turkey 


BG 


Bulgaria 


HU 


Hungary 


ML 


Mali 


TT 


Trinidad and Tobago 


BJ 


Benin 


IE 


Ireland 


MN 


Mongolia 


UA 


Ukraine 


BR 


Brazil 


1L 


Israel 


MR 


Mauritania 


UG 


Uganda 


BY 


Belarus 


IS 


Iceland 


MW 


Malawi 


US 


United States of America 


CA 


Canada 


IT 


Italy 


MX 


Mexico 


uz 


Uzbekistan 


CF 


Central African Republic 


JP 


Japan 


NE 


Niger 


VN 


Viet Nam 


CG 


Congo 


KE 


Kenya 


NL 


Netherlands 


YU 


Yugoslavia 


CH 


Switzerland 


KG 


Kyrgyzstan 


NO 


Norway 


zw 


Zimbabwe 


a 


C6te d'lvoire 


KP 


Democratic People's 


NZ 


New Zealand 






CM 


Cameroon 




Republic of Korea 


PL 


Poland 






CN 


China 


KR 


Republic of Korea 


PT 


Portugal 






cu 


Cuba 


KZ 


Kazakstan 


RO 


Romania 






cz 


Czech Republic 


LC 


Saint Lucia 


RU 


Russian Federation 






DE 


Germany 


U 


Liechtenstein 


SD 


Sudan 






DK 


Denmark 


LK 


Sri Lanka 


SE 


Sweden 






EE 


Estonia 


LR 


Liberia 


SG 


Singapore 







BNSOOCID: <WO 9963709A3_I_> 



• 

INTERNATIONAL SEARCH REPORT 


• 




tat ttonat Application No 

PCT/CA 99/00494 


A. CLASSIFICATION Or SUBJECT MATTER 

IPC 6 H04L12/28 H04L29/06 






According to international Patent Classification (IPC) or to both national classification and IPC 






B. FIELDS SEARCHED 


Minimum documentation searched (classification system followed by classification symoots) 

IPC 6 H04L H04Q 



Documentation searched other than minimum documentation to the extent thai such documents are included in the fields searched 



Electronic data base consulted during the international search (name of data base and. where practical, search terms used) 



C. DOCUMENTS CONSIDERED TO BE RELEVANT 



Category • 


Citation of document, with indication, where appropriate, of the relevant passages 


Relevant lo datm No. 


X 


WO 97 41654 A (MC LOR I NAN ANDREW GEORGE 


1-3, 




;TS0UKAS GEORGE JAMES (AU); ERICSSON 


11-13, 




TELEF) 6 November 1997 (1997-11-06) 


16,19, 






21-26, 






38,43-47 




abstract 






page 1, line 2 -page 7, line 9 






page 10, line 14 -page 11, line 5 




Y 




4.27,28, 






30-33, 






35-37, 






40,41 ; 


A 




14,15,18 




-/-- 





Further documents are listed in the continuation of box C. 



ID 



Patent family members are listed in annex. 



* Special categories of ated documents : 

*A* document defining the general state of the art which is not 

considered to be of particular relevance 
*E* earlier document but published on or after the international 

filing date 

V document which may throw doubts on prtonty daim(s) or 
which is died to establish the publication date of another 
citation or other special reason <as speeded) 

*0* document referring to an oral disdosure. use. exhibition or 
other means 

*P* document published prior to Ihe International filing date but 
later than the priority date claimed 



later document published after the international tiling date 
or pnortty date and not in conflict with the application but 
cited to understand the principle or theory underlying the 
mention 

document of particular relevance: the claimed invention 
cannot be considered novel or cannot be considered lo 
involve an inventive step when the document is taken alone 
' document of particular relevance: the claimed invention 
cannot be considered to wtvolve an inventive step when the 
document is combined with one or more other such docu- 
ments, such combination being obvious lo a person skilled 
in the art. 

' document member of the same patent family 



Date ot the actual completion ot the international search 

7 February 2000 


Date ot maihng of the international search report 

2B. 02. 2000 


Name and mailing address of Ihe ISA 

European Patent Office. P.B. 5818 Patent laan 2 
NL - 2280 HV Rijswijk 
Tel (♦31-70) 340-2040. Tx. 31 651 epo nl. 
Fax (4.31-70) 340-3016 


Authorized officer 

Vaskimo, K 



Form PC T /ISA/210 (lacond ShMt) (July 1992) 



page 1 of 4 



BNSDOCID: <WO 9963709A3J_> 



INTERNATIONAL SEARCH REPORT 



int. -.tonal Application No 

PCT/CA 99/00494 



C.(Continu«ttoo) DOCUMENTS CONSIDERED TO BE RELEVANT j 


Caiegory* 


Citation 01 document, wrtn indica ion. where appropriate, ot the relevant passages 


Relevant to claim No. 


X 


WO 97 32251 A (INTERMIND CORP) 


27, 




4 September 1997 (1997-09-04) 


30-39, 




42,43 




page 1, line 4 -page 13, line 4 






page 16, line 31 -page 19, line 26 






page 20, line 18 -page 23, line 25 






page 29, line 1 -page 32, line 6 






page 36, line 7 -page 38, line 21 






page 44, line 30 -page 46, line 10 






page 52, line 28 -page 57, line 5 






page 58, line 14 - line 19 






page 61, line 27 -page 65, line .31 






page 67, line 13 - line 22 






page 75, line 12 - line 28 






page 78, line 6 -page 86, line 13 






page 89 ] line 26 -page 90, line 2 






page 102, line 5 -page 104, line 1 






page 111, line 7 -page 113, line 19 






page 117, line 18 -page 119, line 9 






page 120, line 31 -page 121, line 18 






page 122, line 19 -page 123, line 21 






page 129, line 1 - line 24 






page 133, line 30 -page 135, line 25 


28,29, 


Y 






40,41 


X 


— 

WO 97 33421 A (BELL COMMUNICATIONS RES) 


38,43 




12 September 1997 (1997-09-12) 






abstract 






page 1, line 6 -page 3, line 14 






naae 4 line 11 - line 31 






page 6, line 5 - line 30 






page 8, line 8 -page 9, line 19 






page 10, line 19 - line 30 






page 13, line 11 -page 14, line 2 






page 23, line 12 - line 26 






page 27, line 14 - line 20 






page 29, line 15 - line 22 




Y 


20,28, 






29,40,41 


A 




1,27,39, 






AO A A 


Y 


US 5 754 954 A (GHOMESHI MOHAMMAD M ET 


4 




AL) 19 May 1998 (1998-05-19) 






abstract 






column 1, line 10 - line 67 






column 3, line 15 -column 4, line 19 






column 5, line 1 -column 7, line 9 




A 


1,5-7 









Form PCT7ISA/210 (contnualion oi Moond shMt) (July 1992) 



page 2 of 4 



BNSDOCID: <WO 9963709A3_I_> 



INTERNATIONAL SEARCH REPORT 



tnt tional Application No 

PCT/CA 99/00494 



C(Continuation) DOCUMENTS CONSIDERED TO BE RELEVANT 



Category • Citation of oocumeni. with inacaiion.wnere appropriate, of trie relevant passages 



Relevant to claim No 



A 
Y 



A 
Y 



US 5 495 484 A (NICKLE JR CLEMENT R ET 
AL) 27 February 1996 (1996-02-27) 
abstract 

column 1, line 6 -column 2, line 27 
column 7, 1 ine 10 - 1 ine 29 



US 5 603 054 A (GOLDSTEIN RICHARD J ET 
AL) 11 February 1997 (1997-02-11) 
column 1, line 34 -column 4, line 59 
column 7, line 4 - line 16 
column 10, line 36 -column 11, line 27 
column 13, line 7 -column 14, line 5 
column 27, line 65 -column 29, line 38 



US 5 673 322 A (BROCKMAN JAMES JOSEPH ET 
AL) 30 September 1997 (1997-09-30) 
abstract 

column 1, line 17 -column 6, line 15 
column 7, line 31 -column 8, line 33 
column 10, line 9 -column 11, line 67 
column 12, line 20 - line 64 
column 13, line 4 - line 10 



US 5 737 531 A (EHLEY LYNNAE ANNE) 
7 April 1998 (1998-04-07) 

column 1, line 14 -column 6, line 19 
column 6, line 53 -column 9, line 58 
column 12, line 59 -column 14, line 45 



WO 96 19064 A (CRUMPLER DENNIS M 
;XCELLENET INC (US); ESTES ROBERT B (US); 
JACKS0) 20 June 1996 (1996-06-20) 
abstract 

page 1, line 2 -page 8, line 20 

US 5 313 582 A (HENDEL ARIEL ET AL) 
17 May 1994 (1994-05-17) 
column 1, line 8 -column 6, line 24 
column 10, line 20 -column 11, line 17 
line 15 - line 27 
line 63 -column 27, line 47 
line 6 - line 48 
line 47 -column 32, line 29 



column 16, 
column 26, 
column 30, 
column 31, 
claims 1,6-8,13,19 



-/-- 



1,5-7 
20 



1,44 

27-33, 
35-37 



34 

27,28, 
30-33, 
35-37 



29,34 
28,29 

27,31,32 
40,41 



27 



6 



Form PCT/iSA/210 (contmuMion ot second July 1992) 

BNSDOCID: <WO 9963709 A3J_> 



page 3 of 4 



INTERNATIONAL SEARCH REPORT 



tnti lonaJ Application No 

PCT/CA 99/00494 



C(Continualion) DOCUMENTS CONSIDERED TO BE RELEVANT 



Category * 



Citation ot document, with indication .where appropriate, ot me relevant passages 



Relevant to claim No. 



WO 97 44942 A (NARRATIVE COMMUNICATIONS 
CORP) 27 November 1997 (1997-11-27) 
page 1, line 9 -page 5, line 31 
page 7, line 10 -page 9, line 19 
page 11, line 18 - line 24 



WO 98 23108 A (ERICSSON TELEFON AB L 
28 May 1998 (1998-05-28) 
page 1 -page 5 



M) 



40,41 
27 

27,31,32 



6 



form PCT/ISA/210 (eonttnuaiwn ot second sheet) (July 1992) 
BNSOOCID: <WO 9963709A3_L> 



page 4 of 4 



INTERNATIONAL SEARCH REPORT 



In. ational application No. 

PCT/CA 99/00494 



Box I Observations where certain claims were found unsearchable (Continuation of item 1 of first sheet) 



This International Search Report has not been established in respect of certain claims under Article I7(2)(a) for the following reasons: 

1. Claims Nos.: . _ . . . 

1 1 because they relate to subject matter not required to be searched by thus Authority, namely: 



^ became they relate to parts of the International Application that do not comply with the prescribed requirements to such 
an extent that no meaningful International Search can be earned out, specifically: 



3 ' ^ becTuselhey are dependent claims and are not drafted in accordance with the second and third sentences of Rule 6.4(a). 



Box II Observations where unity of invention is lacking (Continuation of item 2 of first sheet) 



This International Searching Authority found multiple inventions in this international application, as follows: 



see additional sheet 



1 . [771 As all required additional search fees were timely paid by the applicant, this International Search Report covers all 
searchable claims. 

2 n A* a " searchable claims could be searched without effort justifying an additional fee, this Authority did not invite payment 
of any additional fee. 



3. I I As only some of the required additional search fees were timely paid by the applicant, this International Search Report 
l ' covers only those claims for which fees were paid, specifically claims Nos.: 



4 I I No required additional search fees were timely paid by the applicant. Consequently, this International Search Report is 
restricted to the invention first mentioned in the claims; it is covered by claims Nos.: 



Remark on Protest Q^j The additional search fees were accompanied by the applicant's protest 

[")(] No protest accompanied the payment of additional search fees. 



Form PCT/1SA/21 0 (continuation of first sheet (1 )) (July 1 998) 



BNSDOCID. <WO 9963709A3J_> 



INTERNATIONAL SEARCH REPORT 



International Application No. PCT/CA 99/00494 



FURTHER INFORMATION CO NTINUED FROM PCT/ISA/ 210 

This International Searching Authority found multiple (groups of) 
inventions in this international application, as follows: 

1. Claims: 1-26,44-47 

A method for pushing data items from a host system to a 
mobile data comnuni cation device, comprising the steps ot 
detecting a trigger at the host, and in response redirecting 
data items from the host to the mobile data communication 
device, providing information regarding the configuration or 
the mobile data comnuni cation device, and where the mobile 
data comnuni cation device is a device equipped to receive 
both voice and non-voice data messages. 



2. Claims: 27-37 

A method for pushing data items from a host system to a 
mobile data comnuni cation device, comprising the steps ot 
detecting a trigger at the host, and in response redirecting 
data items from the host to the mobile data comnuni cation 
device, where information is placed in an electronic 
wrapper, where data is transferred inside said electronic 
wrapper, and where the wrapper is received and processed. 



3. Claims: 38-43 

A method of remotely controlling a host from a personal 
comnuni cations device, comprising the steps of establishing 
at the host a set of comnands, sending from the personal 
comnuni cations device a direction to invoke a comnand, 
invoking the comnand at the host, and processing the comnand. 



BNSOOCID. <WO 9963709A3.I_> 



INTERNATIONAL SEARCH REPORT 

information on patent family members 



Int Jonal Application No 

PCT/CA 99/00494 



Patent document 




Publication 


Patent tamiry 


Publication 


cited in search report 




date 


members) 


date 


WO 9741654 


A 


06-11-1997 


AU 


2375097 A 


19-11-1997 








EP 


0864211 A 


16-09-1998 


WO 9732251 


A 


04-09-1997 


US 


5862325 A 


19-01-1999 








AU 


702509 B 


25-02-1999 








AU 


2193597 A 


16-09-1997 








CA 


2247498 A 


04-09-1997 








EP 


0954782 A 


10-11-1999 


WO 9733421 


A 


12-09-1997 


AU 


706931 B 


01-07-1999 








AU 


5184896 A 


22-09-1997 


US 5754954 


A 


19-05-1998 


EP 


0578760 A 


19-01-1994 








JP 


6506811 T 


28-07-1994 








WO 


9217943 A 


15-10-1992 


US 5495484 


A 


27-02-1996 


AU 


678865 B 


12-06-1997 








AU 


8015394 A 


04-05-1995 








CA 


2173343 A,C 


20-04-1995 








CN 


1141714 A 


29-01-1997 








EP 


0724818 A 


07-08-1996 








JP 


9503634 T 


08-04-1997 








WO 


9510925 A 


20-04-1995 


US 5603054 


A 


11-02-1997 


US 


5555376 A 


10-09-1996 








US 


5717955 A 


10-02-1998 








US 


5611050 A 


11-03-1997 








US 


5544321 A 


06-08-1996 


US 5673322 


A 


30-09-1997 


AU 


707755 B 


22-07-1999 








AU 


5525696 A 


10-10-1997 








CA 


2247536 A 


25-09-1997 








CN 


1215518 A 


28-04-1999 








EP 


0885501 A 


23-12-1998 








JP 


11507152 T 


22-06-1999 








WO 


9735402 A 


25-09-1997 


US 5737531 


A 


07-04-1998 


NONE 






WO 9619064 


A 


20-06-1996 


US 


5664207 A 


02-09-1997 








AU 


4363896 A 


03-07-1996 








DE 


19581888 T 


12-02-1998 








GB 


2310982 A,B 


10-09-1997 








GB 


2335832 A,B 


29-09-1999 








US 


5819274 A 


06-10-1998 


US 5313582 


A 


17-05-1994 


CA 


2105866 A 


31-10-1992 








DE 


69229473 D 


29-07-1999 . 








EP 


0582666 A 


16-02-1994 








JP 


8508592 T 


10-09-1996 | 








WO 


9220028 A 


12-11-1992 








US 


5602995 A 


11-02-1997 


WO 9744942 


A 


27-11-1997 


AU 


3137897 A 


09-12-1997 








EP 


0916217 A 


19-05-1999 


WO 9823108 


A 


28-05-1998 


FI 


964621 A 


20-05-1998 








AU 


5552998 A 


10-06-1998 



Form PCTASA/210 (pal«rt family annex) (July 1992) 



BNSDOCID: «WO 9963709A3_I_>