Embodiment
To more intactly describe the present invention with reference to appended accompanying drawing hereinafter now, wherein show the preferred embodiments of the present invention.The present invention can be embodied in multiple multi-form, yet it should be interpreted as the embodiment that is confined to set forth herein.On the contrary, provide embodiment so that the disclosure text is more thorough and comprehensive, and scope of the present invention has intactly been conveyed to those skilled in the art.Identical Reference numeral is indicated components identical all the time, and the main symbol in alternative embodiment is used to refer to similar elements.
The present invention has advantageously overcome the shortcoming of prior art, just be confined to come in the following manner the shortcoming of the different e-mail accounts of initiated access, promptly by disposing such as portable PC or mobile unit, and set up all different the setting, comprise various configuration specifications (convention) and parameter, such as port, be provided with, comprise being used to use the POP of SMTP or other agreements or the agency of similar service device to be provided with that connect, Email and other essential informations start the visit to different account numbers.
The present invention advantageously allows the user only to key in the minimal set of data, and such as e-mail address and password, and system and method for the present invention is used for determining that by making of mode of learning and knowledge base what people visit account number and be connected with server with.The present invention can utilize database to have rank symbolic expression next " conjecture " or definite mailbox configurations such as deterministic as knowledge base and use.
In addition in order to set up the server connection and can to enter a position, such as a mobile phone or PC, only have an E-mail client or other devices, a plurality of different e-mail addresses, the present invention allows those users with limited knowledge about their Email accounts user to define their account number and a plurality of mailboxes of management.This is favourable, because well-known, many people have a plurality of different mailboxes, and those mailboxes may be by various mailbox agreements such as post office protocol (POP), realizes with different E-mail client and different companies.
The present invention has several different aspects.By database is used as standard memory, and the E-mail address interface module is used as the module that is used to learn, might automatically be learnt the mailbox configuration conventions that mail domain is used.In another aspect of this invention, can represent that the symbolic expression of configuration parameter determines the set of potential effective mailbox configurations by interface module and being used to.
As everyone knows, for the mailbox that user capture is provided by their email provider, they must provide the correct set of configuration parameter.These parameters can change, but comprise following these parameters, mail host for example, and port, the login name password, and other are used for the parameter of their mailbox.Any stipulations that email provider freely uses them to select for these parameters.For example, many email provider are used " actual standard (defactostandard) " stipulations for these parameters, such as the mail host name of using " mail.<MailDomain〉", wherein<MailDomain〉expression supplier's free email domain (i.e. " foo.com ").Another example can be the address, such as JohnSmith@_earthlink.net.The user may only know their e-mail address and password, for example, and " password ".Can not be portal number for the information known to the domestic consumer; POP3 server: pop.earthlink.net; Smtp server: smtpauth.earthlink.net; With above-mentioned different user name, ftp server: ftp-www.earthlink.net; A visit ID; And dns address: for example, 207.69.188.XXX.
Yet, also have many mail provider of not observing this stipulations, and these mail provider are used more not conspicuous stipulations for these configuration parameters.Even this makes possible words, determine the task difficulty more of the configuration of the subscriber mailbox in this mail domain.For example, if this user's e-mail address is " john.smith@_foo.smith@_foo.com ", this email provider can be used more not conspicuous stipulations, for example, if login name is " jsmi ".Thereby, importantly write down more not conspicuous stipulations specific concerning email provider or mail domain.
Fig. 1 has shown high-grade (high level) block diagram of custom system 10, and according to an aspect of the present invention, custom system is with intelligent server 11 operations, and it is used as an agency and mailbox interface module, and communicates by letter with source mailbox 12.Custom system 10 comprises different E-mail client 10a, 10b and 10c, it in this example, corresponding to the Outlook e-mail client, an Outlook Express e-mail client, and a proprietary e-mail client that is used for client computer X, each is all relevant with corresponding source mailboxes 12.Custom system 10 also comprises the mailbox structured data 10d that is used for each E-mail client 10a, 10b and 10c.Illustrate that illustrated in the second custom system 10e very clear, different E-mail clients can be arranged in different custom systems.Custom system 10 adopts intelligent server 11 operations as the agency.Custom system will be wireless, mobile device, such as held-held Blackberry unit.Source mailboxes can be arranged in the Internet 12a, among the company intranet 12b, or is positioned among both.As hereinafter explaining, carry out various functions and can comprise various functional modules as agency's intelligent server 11, and a database is as conventions data store and authentication module.Should be appreciated that some functions of intelligent server as the agency can also be downloaded to custom system, and can operate by the user during to mobile device or home computer when input information.
Should be appreciated that to be used for software of the present invention and program relates to and can change, and can use different application operatings.Intelligent server 11 can use web services technology (by the zone explanation that is designated as web services 11a) and comprise the different application service that those skilled in the art use.Web services can comprise the combination of program and data, and it can obtain from the Web server that is used for Web user, or uses other WWW linkers that provided by the ASP to obtain.Web services can use extensible markup (mark-up) language (XML) to transmit as the standard that is used for formatted data.
The arrangement of any kind (arrangement) can be used for visiting intelligent server 11, comprises that equity arranges, central server, or other architectures with communicate by letter.Can use middleware in addition.Data layout can be standardized and can be to use the data of extend markup language (XML) exchange that SGML is the basis of web services descriptive language (WSDL).Different Web servers be can use, the Apache of open source code or the internet information server of MS (IIS) comprised.The IBM Lotus domino service series that other Web server comprises the Novel Web server that is used for its netware operating system user or is used for IBM OS/390 and AS/400 user.Naturally, in a preferred embodiment, any Web server can both be downloaded the request to file transfer protocol (FTP) (FTP) file.
Intelligent server 11 can have different input agencies, the input agency is designed to can be from E-mail client end 10a, 10b and 10c retrieve configuration data, the E-mail client end also comprises Eudora and Netscape except that illustrated Outlook and Outlook Express E-mail client end.Intelligent server can comprise messaging application programming interface (MAPI), with the configuration data of the E-mail client end of retrieving any MAPI of being used for compatibility.MAPI provides application programming interface (API) to guarantee the system independence of message application.The layering of function can be provided between the application program of the message system on any basis, and it is transmitted middleware as message.The application program of MAPI compatibility can be communicated by letter with the MAPI service supplier who carries out the action of request for client-side by mapi subsystem, and arrives the MAPI client-side by MAPI system returned data.Any mailbox configurations data 10d can reside at the configuration record place of custom system 10.Among another embodiment, data can reside in the specific config memory of E-mail client end.
In custom system, Microsoft Outlook Express e-mail client end 10b can visit the source mailbox 12 that uses post office protocol (POP) or Internet Mail Access Protocol (IMAP).Certainly, POP provides the Internet mail server protocol of input message stores.Up-to-date agreement is POP3.POP operates with simple message transfer protocol (SMTP) (SMTP).If mail server will receive, storage and forwarding message, any mail server can move two agreements.Smtp protocol exchanges messages to another from a mail server, and for email mailbox pass-along message to the pop server that requires.Pop server can receive message and keep it is available up to another pop server.The IMAP edition 4 also uses the SMTP transfer mechanism, but it is an agreement more flexibly, because IMAP allows the user needn't download whole new informations to local computer at the mail server stores mail.Certainly, the Internet email service operation SMTP and POP or IMAP, and receive from the input message of any information source and do not check identity.Therefore, can download and read mail selectively, message headers reviewed is set up the message stores of layering, supports address list, and link, authentication and retrieving files.
Intelligent server 11 can use extend markup language (XML) to produce configuration data object and formatted data object, to support the web services of different compatible XML.Server and web services can be the compatible services of Simple Object Access Protocol (SOAP).
Certainly, be the subclass of standard generalized markup language (SGML) as the XML of extend markup language, XML allows on the website storage and delivers data and demonstrating data more galore.Can create customize tag with the defined file content.Common information form and can be can create, form and data shared on the Internet of company and/or other the network in the Internet.Label symbol in XML can be hard-core and be self-defining.Channel definition format (CDF) can be described any channel, and specific CDF file can comprise the initial World Wide Web page data of appointment and how upgrade it.
Be used for the HTTP and the XML of message exchange by use, SOAP allows a program of moving and program mutual communication in identical or another type operation system in a kind of operating system.SOAP can specify in the http header of how encoding in the XML file, therefore, allows a computing machine to call program in another computing machine, also orders it how to return response simultaneously.SOAP has helped allowing data to pass and has screened out those firewall server to the requests of designated port except that knowing application program the sixth of the twelve Earthly Branches.SOAP is based on the agreement of XML, and SOAP has at least three parts, comprising: (a) definition is used for the big envelope that describing message has and so on framework; (b) one group of coding rule that is used to represent the data type of application program definition; (c) be used to represent the stipulations of remote procedure call and response.
Intelligent server 11 can comprise the software that is embodied as the ActiveX control of component object model (COM), and is provided for making up the framework of the software part of intercommunication mutually.Can automatically download ActiveX control and carry out by browser.Can in movable World Wide Web page, set up distributed object applications, and ActiveX control can download to different browsers and client-side.ActiveX control can be used as container and is kept in the Web-browser, and issues by the intranet 12b of the Internet 12a or company.ActiveX control can also be managed and upgrade web content and client-side system and closely cooperate with the user interface of destination OS.Also can use Java applets or similar component object to replace ActiveX control.Be to be understood that object model control among the present invention can also be to use dynamic link libraries (DLL) module of any kind that the component object model routine interface moves in container as application program.
According to one aspect of the invention, the more not conspicuous stipulations that mail domain is used are automatically learnt, and are stored in the stipulations storer.Therefore, the configuration parameter that can be identified for having the subsequent user of the mailbox that belongs to this mail domain based on the stipulations in the stipulations storer of automatic study.
Fig. 2 has illustrated the automatic system of learning by the stipulations of mail domain use that is used for according to one aspect of the invention.System is the part of intelligent server 11, comprises checking (validator) module 13 of the efficient set of determining configuration parameter 14.Server comprises study module 15, and it is accepted the efficient set of configuration parameter 14 and produces configuration specification 16.Configuration convention store 18 can be preferably as the part of server but also can is the database that separates.Its storage is used for the stipulations of each mail domain.Study module 15 can have the database of rule memory 17 as different rules.
Based on a limited number of configuration parameter that the user provides, authentication module 13 is determined the efficient set of configuration parameter 14 for corresponding mailbox.In an embodiment, authentication module 13 may attempt to use the set of the best-guess (estimation) of the configuration parameter that is provided by the service of calling authentication module 13 to visit corresponding mailbox.In an embodiment, if failure is attempted in visit, authentication module 13 may be asked additional information to the user, has the efficient set of configuration parameter up to authentication module 13.The mailbox of authentication module 13 by using the access protocal visit relevant disposing with mailbox.
In an embodiment, authentication module 13 will use the POP visit to enable the mailbox of POP to verify that configuration parameter 14 is effective.In other embodiment, authentication module 13 can use IMAP to visit the mailbox of enabling IMAP.For a person skilled in the art, very apparent, there are many access protocals that may be used for access mailboxes.After attempting confirming configuration parameter 14, the efficient set of authentication module 13 return state information and configuration parameter 14.
Study module 15 is accepted configuration parameter 14, and is that configuration parameter 14 produces configuration specification 16.Configuration specification 16 is rules that format is used for the stipulations of configuration parameter, and these configuration parameters are used to store into configuration convention store 18.In an embodiment, if user e-mail address is " john.smith@_foo.Com ", and the login name parameter that relevant mail host needs is " jsmi ", and the configuration specification 16 interior statements that are used for login name parameter can be<FisrstName〉<LastName (3) 〉.It will be apparent to those skilled in the art that various forms can be used for realizing configuration specification 16.Study module 15 can be used certain test to guarantee that configuration parameter 14 is believable to configuration parameter 14.In an embodiment, if study module 15 will only be learnt stipulations mail host and user's e-mail address in identical mail domain, attempt to destroy the configuration specification 16 of study to avoid " hacker ".The test that can envision other is to guarantee the integrality of learned configuration conventions 16.Study module 15 also can the rule of while application memory in rule memory 17.These rules can be based on commercial criterion or other relevant criterion.In an embodiment, rule may be indicated because security reason does not allow to learn certain stipulations.
Subsequently, study module 15 thinks that acceptable configuration specification 16 is stored in the configuration convention store 18.In an embodiment, configuration convention store 18 can comprise the standard configuration conventions that is applicable to whole territories, and the configuration specification 16 that is used for one or more automatic study of each mail domain.Mail domain can have the configuration specification more than an association, because have the mode and the agreement of the mailbox on a plurality of access mail territory.
Service can be subsequently from configuration convention store 18 access configuration stipulations 16, to produce potential configuration parameter set during to the visit of one or more subscriber mailboxs when configuration.
Fig. 3 is the process flow diagram of an example of the method for explanation learned configuration conventions.In step 22, authentication module 13 attempts determining to allow the configuration parameter group 14 of authentication module 13 access mailboxes.Authentication module 13 returns state and configuration parameter 14 efficient sets that checking is attempted subsequently.And in step 24, study module 15 produces configuration specification 16 based on configuration parameter 14.Study module 15 can be used one group of test to configuration parameter 14, and can use one group of rule that is stored in the rule memory 17 to configuration parameter 14 simultaneously.In step 26, configuration specification 16 is stored in the configuration convention store 18.
Be to be understood that illustrated being used to learn the configuration parameter that the system and method for configuration parameter can be applied to be used for the service except that mailbox access.
As mentioned above, based on empirical evidence, when the configuration parameter mentioned in order to access mailboxes, the many stipulations of most email providers adhere.Nearly all current existing POP mail host is with " mail. ", and " pop. " or " pop3. " is prefix.The user who has e-mail address " john.smith@_foo.Com " probably can be by " mail.foo.Com " by name, and they enable the mailbox of POP the host access of " pop.foo.Com " or " pop3.foo.Com ".In one aspect of the invention, these stipulations are recorded in the data-carrier store, and need the service of calling party mailbox might use stipulations to produce potential configuration parameter efficient set.Therefore server can attempt determining can be used for the configuration parameter efficient set of calling party mailbox.When the user only provided e-mail address and password, the present invention can also be identified for the configuration parameter group of subscriber mailbox.In most of the cases, system and method for the present invention can also successfully be determined configuration parameter.When introducing or finding new stipulations, can easily be added to them in the data-carrier store.
The one aspect of the present invention that in Fig. 4, shows, conjecture device or determination module 32 are parts of server 11 and as mailbox interface module, and the set that produces possible configuration parameter 34 in conjunction with the configuration specification 16 that is stored in configuration conventions data store 18 based on the configuration information 30 that the user provides.Service can be used the proper configuration parameter group of set to determine that the calling party mailbox requires of configuration parameter 34.
Fig. 5 has shown the more details of configuration specification 16.Know that very configuration specification is the set that is formed e-mail expressions by symbol, symbol can be a literal, such as port numbers.In an embodiment, configuration specification 16 can comprise statement that is used for the server name parameter and the statement that is used for login name parameter.In an embodiment, if given e-mail address " john.smith@_foo.com ", email provider is used login name " " jsmith " and mail domain " mail.foo.com "; the login name in the configuration specification 16 can be<FirstName (1)〉<LastName 〉, and server name expression can be " mail.<MailDomain〉".In this example, statement<FirstName (1)〉in parenthetic numeral from parameter<name the quantity of the character of use, promptly. " j ".It will be apparent to those skilled in the art that various symbolic representation may be used for representing the stipulations of configuration parameter.Configuration conventions data store 18 stored configuration stipulations 16.When introducing or finding new stipulations, can easily be added to configuration convention store 18 to them.
Information 30 that module 32 provides based on the user and the set that produces possible configuration parameter 34 from the associated configuration convention 16 of configuration conventions data store 18.In most cases, user e-mail address provides enough information to be produced configuration parameter set accurately.In an embodiment, given e-mail address " jane.doe@_foo.Com ", module 32 will use the possible configuration parameter 34 " jdoe " of configuration specification 16 generations to be used for login name and " mail.foo.com " is used for server name.
When definite configuration parameter, email provider is used many stipulations, and therefore, module 32 produces the set of many possible configuration parameters 34.For reducing the quantity of the set that produces, based on additional user information, or may be in the heuristics 33 to likelihood successful under the stable condition based on the set of given configuration parameter 34, module 32 can only produce the subclass of the set of possible configuration parameter 34.In an embodiment, the user can indicate protocol expression 39 configuration specifications 16 of only considering to have " IMAP ".In example, heuristics 33 can comprise follows the tracks of quantity and the success percentage that statistics is used the trial of given configuration specification 16, and if meet certain condition thus, only produce possible configuration parameter 34 based on this configuration specification 16.
Fig. 6 is the process flow diagram that the example of the method for guessing the possible configuration parameter that is used for the configuration access subscriber mailbox 34 is described.In step 40, module 32 receives user configuration information 30.In step 42, module 32 is from configuration conventions data store 18 retrieval associated configuration convention 16.In step 44, the set that the information 30 that module 32 provides based on configuration specification 16 and user produces possible configuration parameter 34.In this step 44, will be the heuristics of effective likelihood 33 by using configuration parameter 34 set, perhaps information 30 by using additional user to provide, module 32 mostly just produces the subclass of possible configuration parameter 34.
According to an aspect of the present invention, very clearly be used to guess that the configuration parameter system and method can be applied to the configuration parameter of the service except that mailbox access.
Though many email provider are quite observed the configuration parameter Standards Code, for example naming mail host is " mail.<MailDomain〉", and the coupling login name is to e-mail address, there are many other email provider to use less conspicuous stipulations, login for example is set to be called<FirstName (1))〉<LastName (3) 〉, have the user under the situation of e-mail address of " john.smith@_foo.Com ", will be translated into login name " jsmi ".Under the situation of using URL(uniform resource locator) (URL) agreement indication mailbox location, stipulations are more to lack standard, because login name often embeds the centre of URL.
By these stipulations of record in data-carrier store, need the service of calling party mailbox might use stipulations to produce potential configuration parameter efficient set, attempt determining can be used for the configuration parameter efficient set of calling party mailbox then.Therefore, even the user can not provide the configuration information of whole necessity, might be identified for the configuration parameter set of subscriber mailbox.All demands to the user are e-mail address and password, and in most of the cases, perhaps system can successfully determine configuration parameter thus.When introducing or finding new stipulations, can easily be added to data-carrier store to them.
According to an aspect of the present invention, use symbolic expression to represent configuration parameter, symbolic expression can be retained in configuration conventions data store 18 and use for service.This allows service to obtain configuration specification from data-carrier store, and uses context data, and structure can be used for the configuration parameter efficient set of access mailboxes.
Fig. 7 has illustrated the example of the system of the present invention of the configuration that is used to produce the set that comprises configuration parameter 54.Adopt as the converter module 52 of the part of server 11 to be stored in the configuration specification 16 in the configuration conventions data store 18 and to expand them, produce configuration parameters 54 with the context data 50 that provides based on the user.
The more details of the symbolic representation formula of Fig. 8 configurations shown stipulations 16.Configuration specification 16 represents that in the symbol mode email provider is the stipulations that the configuration parameter set is used.Configuration specification 16 comprises each configuration parameter statement 39 of expression use symbol 57.In an embodiment, configuration specification 16 can form the statement that is used for the server name parameter, is used for the statement of login name parameter and is used for the statement of mail protocol.In an embodiment, if given e-mail address " " john.smith@_foo.com "; email provider is used login name " jsmi " and mail domain " mail.foo.Com "; the login name in the configuration specification 16 can be<(3)〉<surname 〉, and server name expression can be " mail.<MailDomain〉".In this example, the quantity of the character that parenthetic numeral is used from the user name parameter in the symbol 57 "<FirstName (1)〉", i.e. " j ".Similarly, symbol 57<LastName (3)〉quantity of the character that uses from the parameter surname of numeral in the brace, i.e. " smi ".It will be apparent to those skilled in the art that various symbolic representation may be used for representing the stipulations of configuration parameter.The selection of statement 39 can be quite arbitrarily, and only can be according to the requirement constraint of the context data 50 expanded configuration parameters that offer converter module 52 by statement 39.
Configuration conventions data store 18 stored configuration stipulations 16.When introducing or finding new stipulations, can easily be added to configuration conventions data store 18 to them.By using its respective value of 57 one-tenths of context data 50 each symbols of expansion, converter module is explained 39 to each and is extended to configuration parameter.In an embodiment, configuration specification 16 can comprise mail protocol expression 39a, " POP ", server name expression 39b " mail.<MailDomain〉" and login name expression 39c "<FirstName (1)〉<LastName (3)〉", for example, a plurality of as shown in Figure 5 statements.Comprise e-mail address " john.smith@_foo.com " if converter module 52 possesses context data 50, converter module 52 will infer that mail domain is " foo.com " from e-mail address.So it is used for the configuration parameter 34 of " POP " of mail protocol with generation, is used for " mail.foo.com " of server name and is used for " jsmi " of login name.
Fig. 9 is that explanation produces the example of the process flow diagram of collocation method by using context data 50 expansion statements 39.In step 60, converter module 52 receives context data 50.In step 62, converter module 52 is inferred the mail domain of subscriber mailbox, and retrieves relevant configuration specification 16.In step 64, the symbol 57 in the statement 39 of converter module 52 use context datas 50 configuration convention 15 is to produce by 54 groups of configurations that form of configuration parameter.
In following example, further described with reference to Figure 10 and can be used to the exemplary portable mobile radio communication apparatus 1000 of the present invention.Equipment 1000 comprises shell 1200, keyboard 1400 and output unit 1600.The output device that shows is a display 1600, preferably complete graphic presentation LCD.The output device of other types can be as alternative.Treatment facility 1800 is included in the shell 1200, and connects between keyboard 1400 and display 1600.Treatment facility 1800 is controlled the operation of display 1600 in response to the action of the key of user on keyboard 1400, and the whole operation of mobile device 1000.
Shell 1200 can be vertically to extend, and maybe can use other size and shape (comprising the clam shell shell mechanism).Keyboard can comprise mode selecting key, or is used for other hardware or software of between text inlet and phone inlet conversion.
Except treatment facility 1800, schematically shown other part of mobile device 1000 at Figure 10.These comprise communication subsystem 1001; Short-range communications subsystem 1020; Keyboard 1400 and display 1600, and other IO unit 1060,1080,1100 and 1120; And storage device 1160,1180 and different other equipment subsystems 1201.Preferably, mobile device 1000 is two-way RF communication devices, has speech and its communication ability.In addition, mobile device 1000 preferably has the ability of communicating by letter with other computer system by the Internet.
The operating system software that treatment facility 1800 is carried out preferably is stored in non-volatile storage, and for example flash memory 1160, but can be stored in other memory device, for example ROM (read-only memory) (ROM) or similar memory element.In addition, system software, specific device applications, or its part can temporarily be loaded into volatile memory, and for example random-access memory (ram) is 1180 li.The signal of communication that mobile device receives can be stored among the RAM 1180 simultaneously.
Except its operation system function, treatment facility 1800 starts the execution of software application 1300A-1300N at equipment 1000.During manufacture, the predetermined application group of control basic device operations can be installed on equipment 1000, for example data and conversation 1300A and 1300B.In addition, personal information management (PIM) application program can be installed during manufacture.PIM preferably can the organization and management data item, Email for example, calendar event, voice mail, appointment, and task items.The PIM application program preferably can be by wireless network 1401 clauses and subclauses that transmit and receive data.Preferably, by wireless network 1401, equipment user's corresponding data item of pim data item and storage is seamless integrated, synchronous and renewal, or relevant with host computer system.By communication subsystem 1001, perhaps may pass through short-range communications subsystem, come the executive communication function, comprise data and conversation.Communication subsystem 1001 comprises receiver 1500, transmitter 1520 and one or more antenna 1540 and 1560.In addition, communication subsystem 1001 also comprises processing module, for example digital signal processor (DSP) 1580, and local oscillator (LOs) 1601.The communication network that mobile device 1000 is used for operating is therein depended in the particular design of communication subsystem 1001 and realization.For example, mobile device 1000 can comprise and is designed to operate Mobitex, Data TAC or general packet radio service (GPRS) mobile data communication network, and be designed to operate any speech path network, AMPS for example, TDMA, CDMA, PCS, GSM, or the like communication subsystem 1001.The separation of other types and integrated data and voice network also can use with mobile device 1000.
Access to netwoks requires to change the type that depends on communication system.For example, in Mobitex and DataTAC network, on network, use unique personal identity number or register mobile device with each device-dependent PIN.Yet in GPRS network, access to netwoks is associated with the user of user or equipment.Therefore GPRS equipment need subscriber identity module, is commonly referred to SIM card, so that operate on GPRS network.
When finishing required network registry or activation, mobile device 1000 can send and receiving communication signal by communication network 1401.Be routed to receiver 1500 by antenna 1540 from the signal that communication network 1401 receives, receiver provides signal to amplify, frequency downconverted, and filtering, communication scheduling, or the like, and the analog to digital conversion also can be provided.The analog digital conversion of received signal allows DSP 1580 to carry out more complicated communication function, for example demodulation sign indicating number.Can be in a similar manner, be transferred to the signal of network 1401 and be provided to transmitter 1520 subsequently and carry out digital-to-analog conversion by DSP 1580 processing (as modulating and coding), change on the frequency, filtering is amplified and is transferred to communication network 1401 (or network) by antenna 1560.
Except process communication signals, DSP 1580 provides the control of receiver 1500 and transmitter 1520.For example, can be controlled at the gain that is applied to signal of communication in receiver 1500 and the transmitter 1520 adaptively by the automatic gaining controling algorithm of in DSP 1580, realizing.
In data communication mode, handle received signal by communication subsystem 1001, for example text message or World Wide Web page are downloaded, and are input to treatment facility 1800.Further handle received signal to output to display 1600 by treatment facility 1800 subsequently, perhaps arrive other utility appliance input-output unit 1060.The equipment user also can use keyboard 1400 and/or other auxiliary input-output device 1060, touch pad for example, rocker switch, thumb wheel, or the input equipment of other type writes data item, for example email message.Can transmit the data item of writing by communication network 1401 by communication subsystem 1001 subsequently.
In voice communication mode, the whole operation of equipment is similar to data communication mode basically, and except received signal outputs to loudspeaker 1100, and the signal that is used to transmit is produced by microphone 1120.Can on equipment 1000, realize alternative speech or audio frequency I/O subsystem, for example audio information recording subsystem.In addition, in voice communication mode, also can use display 1600, for example duration of display of calling user identity voice call, or other voice call.
Communication between short-range communications subsystem startup mobile device 1000 and other next-door neighbours' the system or equipment, these need not to be similar devices.For example, short-range communications subsystem can comprise infrared equipment and relevant circuit and element, or the Bluetooth communication module is to provide and similar system communication of enabling and equipment.
Be to be understood that above-mentioned instructions only relates to preferred embodiment by example.Whether the many variations to aforesaid system and method it will be apparent to those skilled in the art that, and conspicuous like this variation is within described scope of the present invention, no matter clearly state.
For example, be used to learn and guess that the system and method for configuration parameter can be applied to the configuration parameter of the service except that mailbox access.Symbolic expression can be used for representing the stipulations of the service configuration parameter except that Email and mailbox access.
The application relates to co-pending patent application " SYSTEM AND METHOD FORGENERATING CONFIGURATIONS USED FOR ACCESSINGELECTRONIC MAILBOXES " and " SYSTEM AND METHOD FORAUTOMATICALLY LEARNING MAILBOX CONFIGURATIONCONVENTIONS ", these applications are that same applicant and inventor are submitting on the same day, and the disclosure of these applications is hereby incorporated by.
Study those skilled in the art can recognize have the advantage that in above-mentioned instructions and relevant accompanying drawing, illustrates to many modifications of the present invention and other embodiment.Therefore, be to be understood that the present invention is not limited only to disclosed specific embodiment, modification and embodiment should comprise within the scope of the appended claims.