Abstract: A system and method automatically creates message forwarding rules. The method can include receiving a message having at least one recipient and, for each of the at least one recipient, determining whether a rule exists including the recipient; if a blocking rule exists for the recipient, deleting the blocking rule and creating an active forwarding rule for the recipient; and, if no rule exists for the recipient, creating an active forwarding rule for the recipient.
Abstract: The system and method herein provide selecting and presenting user customizable preferences. Techniques involved can include having a custom entry in a list box such that the list view item updates its displayed item based upon the configuration settings. As such, the user can see what has been set as a custom preference without having to go into secondary dialog boxes. The techniques can be particularly advantageous with wireless devices that need to minimize the number of fields that must be viewed to get information.
Abstract: The system and method herein involve use of a proxy to translate between compressed and uncompressed documents. The proxy uncompresses compressed documents from a client and forwards the uncompressed version to a specified server. The response from the server goes to the proxy which compresses the document from the server before communicating it to the client. The server can dynamically generate code space for the uncompressed server response to the client, if needed, and supply it to the proxy.
Abstract: The system and method herein involve obscuring or encrypting a user identification (ID) for use in a plain text, unencrypted authentication scheme, such as Digest, Basic, or NTLM authentication. An exemplary embodiment of the system and method involves the creation of an obscured username that can be communicated over a unsecure communication channel, such as, a wireless communication channel, without disclosing identification information to third parties. One way in which the obscured username is created is by encrypting a plain text username. Both the obscured username and plain text username are stored at the client such that the obscured username is communicated over unsecure channels when the user enters the plain text username. Thus, the obscuring process is transparent to the user.
Abstract: The system and method herein provide for the populating of a contact list on a portable device. Techniques involved can include monitoring and scanning messages in an email inbox to retrieve display names and simple mail transfer protocol (SMTP) addresses of senders and/or recipients for each email. The system and method can selectively filter information from the emails to populate the contact list with new names and resolve any conflicts with existing names.
Abstract: A method and apparatus for producing custom output in response to user input is disclosed. The method involves producing custom output in response to user input by locating in a programmable device at least one user-specified output character associated with user input in response to receipt of an input code representing the user input, and providing the at least one user-specified output character for use by an application program. The method may involve receiving the input code from a web interface in communication with a communications system such as a wireless communications system. There is also disclosed an e-mail system comprising a web server operable to establish communications with devices using the World Wide Web, and an e-mail server operable to communicate with the web server. At least one of the web server and the e-mail server is programmed to produce at least one user-specified output character for use in a field of an e-mail in response to receipt of an input code from one of the devices.