Electronic mail system with RF communications to mobile processors

ABSTRACT

A system (100) for transmitting information from one of a plurality of originating processors A-N to at least a plurality of destination processors (A-N) which may be transported during operation in accordance with the invention includes at least one gateway switch (14), a gateway switch storing information received from one of the at least one originating processor prior to transmission of the information to the at least one destination processor; a RF information transmission network (302) for transmitting stored information received from one of the at least one gateway switch by RF transmission to at least one destination processor; at least one interface switch (304), an interface switch connecting a gateway switch to the RF transmission network and transmitting stored information received from one of the at least one gateway switch to the RF information transmission network; and wherein the information is transmitted to a receiving interface switch by the electronic mail system in response to an address of the receiving interface switch which has been added to the information originated by the originating processor by either the originating processor or gateway switch and the information is transmitted from the receiving interface switch to the RF information transmission network with an address of the destination processor to receive the information which has been added by either the originating processor, a gateway switch or the receiving interface switch.

CROSS-REFERENCE TO RELATED APPLICATIONS

Reference is made to other applications which are incorporated by reference in their entirety.

U.S. patent application Ser. No. 07/702,319, filed May 20, 1991, now abandoned, which is a parent of U.S. patent application Ser. No. 08/247,466, filed May 23, 1994, now U.S. Pat. No. 5,438,611 entitled "Electronic Mail System With RF Communications to Mobile Processors Originating From Outside of the Electronic Mail System"; and

U.S. patent application Ser. No. 07/702,938, filed May 20, 1991, now U.S. Pat. No. 5,479,472, issued Dec. 26, 1995, entitled "System for Interconnecting Electronic Mail Systems By RF Communications"

This application is a Continuation of U.S. patent application Ser. No. 08/844,957 filed Apr. 23, 1997, now U.S. Pat. No. 5,819,172, which is a continuation of U.S. patent application Ser. No. 08/443,430, filed May 18, 1995, now U.S. Pat. No. 5,625,670, which is a continuation of U.S. patent application Ser. No. 07/702,939, filed May 20, 1991, now U.S. Pat. No. 5,436,960.

APPENDIX

An Appendix containing a listing of control programs for controlling the transmission of information between an RF receiver and a destination processor and controlling the operation of an interface switch in accordance with the invention is attached. The programs are written in the C programming language. The program for controlling the transmission of information from the RF receiver to the destination processor appears at pages 1-9 and the program for controlling the operation of the interface switch appears at pages 10-12. The Appendix contains subject matter which is copyrighted. A limited license is granted to anyone who requires a copy of the program disclosed therein for purposes of understanding or analyzing the invention, but no license is granted to make a copy for any other purposes including the loading of a processing device with code in any form or language.

DESCRIPTION

1. Technical Field

The present invention relates to electronic mail systems for transmitting information between processors.

2. Background Art

The use of computers to send and receive electronic mail messages is becoming very popular globally. Numerous companies (both network and software related) offer electronic mail packages (E Mail) and services. Currently, electronic mail services provide a convenient alternative to the more formal facsimile transmissions of memos and documents. Electronic mail is typically used to send relatively short informal messages between computers within an organization, or to a party located at a distant location or company. Electronic mail services are basically a wire line-to-wire line, point-to-point type of communications. Electronic mail, similar to facsimile transmissions, provides a one-way message. A recipient typically does not have to interact with the message. Electronic mail, unlike facsimile, is a non-real-time message transmission architecture.

FIG. 1 illustrates a block diagram of a typical electronic mail system 10 in commercial use such as by AT&T Corporation. The electronic mail system 10 is comprised of a plurality of single processors or groups of processors #1-#N with N being any number with each group having individual processors A-N with N being any number. The groups of processors #1-#N may be distributed at locations which are linked by the public switch telephone network 12. The individual processors may be portable personal computers with a modem which are linked to the public telephone switch network 12 through wired or RF communications as indicated by a dotted line. Groups of associated processors #1-#3 may have diverse configurations with the illustrated configurations only being representative of possible architectures of groups of associated processors. The groups of associated processors may be connected to a host or mainframe computer through various communication mechanisms such as direct telephone communications (#1), communications through a local area network (#2), or communications through a private automatic branch exchange (#3). It should be understood that the illustrated architecture of the single and associated groups of processors is only representative of the state of the art with numerous variations being utilized. Many of the groups associated processors are contained within the database network of a single company or organization located at distributed geographical locations throughout a country or in different countries.

Communications between an originating processor A-N, which may be any of the processors within the groups of associated processors #1-#3 or processor #N and a destination processor A-N are completed through the public switch telephone network 12 to one or more gateway switches with mailboxes 14 which function to store the message for delivery to the destination processor at a later point in time. The gateway switches with mailboxes 14 have a storage location, associated with each subscriber which may be any of the computers A-N within the associated groups of computers #1-#3 and individual computers #N, which provides retrieval capability of the electronic message when it is not delivered directly to the destination processor A-N such as when the destination processor does not go directly off hook in response to an attempt to deliver the message from storage in the electronic mail gateway mailbox storage location associated with the destination processor. In order to originate an electronic mail message, the originating processor A-N calls an associated gateway switch with mailboxes 14 via telephone through the usage of a modem connection. This connection is made through the public switch network 12. A gateway switch with mailboxes 14 answers and provides a data connection to the originating processor A-N. The gateway switch with mailboxes 14 typically contains the originating processor A-N file and verifies that the sending processor is able to originate an electronic mail message via some form of password protection. Upon verification of the entry password, the electronic gateway switch with mailboxes 14 down loads software and entry screens that are displayed on the originating processor to permit a message to be composed. Thereafter, the message is composed and transferred from the originating processors gateway switch with mailboxes 14 to the destination processors gateway switch with mailboxes where the message is stored and an attempt is made to deliver the message to the destination processor via telephone connection through the public switch telephone network 12.

Electronic mail systems have several common items that must be entered in order to originate and send (format) an electronic message. These items include the destination address, which consists of either the person or company's name, an abbreviated form of the person's company or name, or a series of digits or alphanumeric characters that must be entered to indicate to the electronic mail system the destination address of the recipient processor. Another item is an identification of the originating processor which may be an indication of the sender or the originator's name, company name, an abbreviated form of the originator's name or company name, or a numeric or alphanumeric entry that comprises the sender's name or address. This information is collectively an identification of the originating processor. Another item is the subject of the message which is typically a short reference as to the subject matter of the text or message that follows. Finally, the message or message text must be entered which is the information that is inputted by the person or machine which is originating the message at the originating processor A-N. Upon completion of the message text, the user or machine operating the originating processor A-N enters a series of commands or keystrokes on the originating processor to transmit the message to the gateway switch with mailboxes 14 associated with the originating processor A-N.

The transmission of the message from the originating processor's gateway switch with mailboxes 14 to the destination processor's electronic mail gateway switch with mailboxes is via analog or digital communications through the public switch telephone network. The destination gateway switch with mailboxes 14 contains the destination address of the recipient destination processor.

Upon arrival of the information at the destination processor's gateway switch with mailboxes 14, one of two events takes place. The information is typically stored in the destination processor's electronic mailbox for later retrieval by the destination processor through interaction by the user of the destination processor. This typically happens as a result of the fact that a person is not located at the destination processor at the time of delivery of the message to the gateway switch with mailboxes 14 or the destination processor is not turned on and connected to the public switch telephone network 12. A second methodology is that the destination processor's gateway switch with mailboxes automatically dials the gateway processor's telephone number to deliver the information. In the situation where the destination processor is within a company or organization, the information may be delivered to the host computer. The destination processor's host computer stores the information until the destination processor calls the host computer to retrieve the information. In both of the methodologies described above, information delivery requires periodically calling a host computer or a mailbox at the gateway switch with mailboxes 14 to determine if new messages are present. This incurs additional costs in telephone calls and/or labor. If the host computer or gateway switch is not checked frequently, the information becomes untimely in its delivery. If the destination processor frequently checks the host computer or gateway switch, then additional costs and telephone calls and/or labor are encountered.

As personal computers are used more frequently by business travellers, the problem of electronic mail delivery becomes considerably more difficult. A business traveller carrying a portable PC has great difficulty in finding a telephone jack to connect the PC to fetch electronic mail from either a host computer or a gateway switch. Connections for a PC's modem are difficult to find in airports and with the advent of digital PABX's in businesses the telephone connectors are incompatible with a PC's analog modem. Hotels and motels oftentimes have internal PABX's that prevent calls from automatically being placed by the user's PC to electronic mail gateway switches to retrieve information. Most portable PC modems will only operate correctly when connected to a true outside telephone line that has telephone battery voltages and dial tone available to permit the number to be dialed direct. The inability to find an appropriate connection to connect the PC modem when travelling has contributed to the degradation of electronic mail reception when the recipient is travelling. When travelling internationally, this problem is further compounded by the fact that most electronic mail gateway mailboxes require a 1-800 toll free number to be dialed in order to connect the mailbox. Almost all 1-800 telephone numbers are available for continental use only and cannot be accessed from a foreign country.

Industry trends make it increasingly difficult to receive electronic mail. When PC's were exclusively considered an office or desktop machine, it was less difficult to deliver electronic mail. Advances in the state of the art in microelectronics have permitted PC's to be downsized to very lightweight portable (notebook), and notebook size computers. These portable units have the computing and storage power of the former desktop units and have lent themselves to the trend that they now become very portable in their utilization. They are small enough that they can easily fit into an attache case and/or a suit pocket. The net result is that the portable unit no longer resides in the office or the desktop. The portable unit now may be taken home at night, as well as on travel with the user, such as for business travel. Increased portability of PC's further aggravates the problem of automatic electronic mail delivery as a consequence of portability eliminating the wired communication paths which have been typically used in state of the art electronic mail systems. The electronic mail industry is currently experiencing a rapid growth rate.

Numerous communication companies are offering forms of electronic mail services. However, a problem arises that users of one electronic mail system currently cannot send electronic mail to a subscriber of another electronic mail system (e.g., AT&T E-mail to Sprint Mail, etc.). Numerous attempts are currently underway in the industry to solve this problem. Current attempts are the utilization of common protocols between electronic mail systems (e.g. X.400). However, the proposed system does not resolve the problems resultant from portability and travelling situations described above.

FIG. 2 illustrates a diagram of a prior art network 100 developed by Telefind Corporation of Coral Gables, Fla., which provide paging and data transmission capability and is a preferred form of the RF information transmission network used in practicing the present invention. This network is described in detail in U.S. Pat. Nos. 4,866,431, 4,868,558, 4,868,562, 4,868,860, 4,870,410, 4,878,051, 4,881,073, 4,875,039 and 4,876,538 and U.S. patent application Ser. Nos. 409,390, 464,675, 465,894, 464,680, 429,615, 429,541, 409,605, and 456,742 which are incorporated herein by reference in their entirety. The system was a distributed network of switches comprised of a plurality of local switches 112, a plurality of lata switches 114 and a plurality of hub switches 116 with each switch being located in a different geographical location within an area being serviced by the system. The hub switches 116 may be located totally within a country to provide national service or in multiple countries to provide international service. Only a single portion of the network is labelled with reference numerals with it being understood that repeating portions exist such as for that portion under the jurisdiction hub switch #P. Communication links which are illustrated as a dotted arrow represent network structure which has been omitted for clarity that is identical to structure that is illustrated in detail. Additionally, one or more sublocal switches may optionally be provided within the system under the jurisdiction of the local switch as described in the aforementioned patents. The sublocal switches have been omitted for purposes of clarity. Each switch has jurisdiction over a geographic area. The functions performed by the local switch 112, the lata switch 114 and the hub switch 116 are described below. A local paging service 118 is typically connected to each of the local switches 112 which offers other paging services although it should be understood that the local switch may be used exclusively to control all services offered at the local level. The local paging service 118 is typically an existing common carrier paging service which services an area within broadcast distance of a transmitter 115 under the jurisdiction of the local paging service to which the local switch 112 has been connected to permit the local paging service to function in the network to transmit pages to a plurality of paging receivers 119 (only one having been illustrated) connected to a peripheral device 119 which may be a data processor printer, telex service, facsimile service or other types of data processing devices. The paging receivers automatically download data stored in their memory upon connection to a printer for producing a printout of the data. The printer was sold with the receiver by Telefind Corporation of Coral Gables, Fla. The paging receivers 119 are described in U.S. Pat. Nos. 4,849,750, 4,851,830, 4,853,688, 4,857,915, 4,928,100, 4,935,732, 4,978,944 and 5,012,235 and U.S. patent application Ser. Nos. 381,483, 381,527, 597,350 and 662,616 which were assigned to Telefind Corporation of Coral Gables, Fla. The transmitter 115 may be either an analog or digital transmitter. Communications between the local, lata and hub switches may be by any existing communication medium 120 such as direct dial-up circuits (IDD Circuits International), direct outward dial circuits (end-to-end), in-bound watts (and other in-bound services that are volume discounted), out-bound watts (and other out-bound services that are volume discounted), feature group A (U.S. service), feature group B (U.S. and European services), MF tie trunks (U.S. and European services), and direct inward dial (international service, where available), as well as any future medium which permits pages to be transmitted between switches. Each of these services are indicated schematically by a bi-directional arrow 120 which interconnects a local switch 112 to a lata switch 114, a lata switch to a hub switch 116, and a hub switch to another hub switch. Furthermore, the local switches 112 are connected to a local paging service 118 by a communication link 122 of any conventional nature, including wires connecting the local switch to the local paging service. Each switch is provided with a local telephone trunk 127 which functions as a maintenance port. Furthermore, dotted bi-directional lines 124 illustrate alternative communication paths between switches which may be used in the case of malfunction or busy conditions. It should be further understood that the network is not limited to any particular communication protocol linking switches, nor connecting the local switch to the local paging service. A telephone trunk 28 functions as an input for manual (telephone handset) and automatic device entry of pages as described below.

The network 110 provides numeric, alphanumeric and data services to all points within the United States and participating countries. In the preferred embodiment of the network, a universal code is used for encoding transmissions of characters over both the communication links 120 and 122 which is compatible with existing analog and digital transmitter 115. A universal code discussed in the aforementioned patents utilizes sixteen tones for encoding all characters for transmission between switches or to a local paging service 118. Each character is transmitted as two successive tones. A X.25 modified transmission protocol which is disclosed in the aforementioned network patents is preferably utilized for transmitting packets of pages between switches.

The network 110 is economical to implement and operate as a consequence of utilizing distributed processing technologies and transmission of pages periodically in packets of pages between the switches. Dynamic interaction between a frequency agile pager, which preferably is of the type described in the above-referenced receiver patents and applications and the network 110 efficiently utilizes transmission time that is available in the frequency spectrum. One of the distinct advantages of the network 110 is that it utilized existing paging common carriers to deliver pages to the end user with existing paging RF coverage in the United States being greater than 85% of its geographical area with just two 150 MHz frequencies with a total of 10,500 additional frequencies being available for paging receiver use. Wire line common carriers, private systems, hospital, government, emergency and many other services can be accommodated by the utilization of dynamic frequency programming, by the network 110 to change the frequency band on which individual paging receivers may receive pages.

The network 110 provides an integrated sublocal, local, regional and nationwide paging network that is transparent to use by the subscriber and provides for pages (data transmissions) to be called into an existing local paging service 118 by the making of a local phone call on a telephone trunk 128 connected to the local switch 112 in a conventional fashion as well as to any lata switch 114 throughout the network 110 by a local phone call to telephone trunk 126. The functionality of permitting pages or data transmissions to be originated anywhere within the network 10 by local telephone call, preferably by calling a single number within the country (950-XXXX) avoids the telephone expense and system overhead caused by calling of a central switch to originate a page. It should be understood that the network's usage of periodically transmitting packets of pages between switches results in a much lower cost than the cost of 800 or conventional long distance service. The phone trunk 126 for calling the lata switch 114 to place a page anywhere within the network 110 is indicated by bidirectional arrows to each lata switch. Regardless of the location of the person making the telephone call to a lata switch 114 over telephone trunk 126 to originate a page, the lata switch will formulate a page with the destination specified by geographically descriptive digits of the identification code inputted with the call to request a page or data transmission to the lata switch and the network 110 will automatically route the page through the switches of the network to the person being paged by way of the local switch 112, which stores a subscriber file that stores the identification code of the subscriber and paging receiver. The local switch 112, which stores the identification code inputted with the page in its subscriber file, adds one or more destinations to the page and transmits the page(s) to the local paging service 118 and/or the network 110 by way of the lata switch 114 having jurisdiction. The person placing the page by calling the local switch 112 on telephone trunk 128 or the lata switch 114 on telephone trunk 126 does not have to know the location of the person receiving the page.

The local switch 112 is connected to a participating common carrier paging service 118 located in a particular geographic area. The local switch 112 has local direct inward dial trunks 128 which permits the subscriber to use a local telephone call to place a page. Pages over the local telephone trunks 128 may be (1) numeric characters which are entered manually by DTMF tones or other telephone coding mechanisms, (2) alphanumeric characters which are entered manually by DTMF tones or other coding mechanisms, (3) alphanumeric characters which are entered by an automatic message inputting device using an encoding format having a transmission protocol of conventional nature such as DTMF tones or (4) a high speed (baud rate) encoding protocol such as an X.25 protocol permitting a variable number of pages or data transmissions each with its own network destination to be formed into a packet which is transmitted to a single switch. The local switch 12 has voice prompting which facilitates the person placing a call on the telephone trunk 28 to enter a message to be transmitted as a page.

The local switch 112 processes the pages received from the telephone trunk 128 and from the associated lata switch 114 to which the local switch is connected by the communication link 120. It should be understood that the local switch 112 has programming which automatically and dynamically monitors paging traffic when a plurality of transmission frequencies are used and allocates the frequencies available to the paging service 118 for transmission to the paging receivers to maximize the local paging services paging throughput as described below. The local switch 112 calls the resident local paging terminal of the paging service 118 and determines how much air time it has to deliver a batch of pages to the transmitter 115 associated with the local paging service. The local switch 112 then calls the local paging terminal of the local paging service 118 and transmits a batch of pages encoded in the hybrid encoding format described below which is compatible with existing analog and digital FM paging transmitters.

The local switch periodically transmits packets of pages or data transmissions stored in an outbound lata buffer over communication link 20 to the lata switch 114 having jurisdiction over it which provides cost efficient transmission and efficient page or data transmission processing. This architecture is highly efficient in routing the pages originating at the local switch 112 to be transmitted by the network 110 which are intended for broadcast by a transmitter remote from the local switch having a subscriber file storing the identification code of the subscriber to which data or a page is to be transmitted.

When the subscriber desires to receive regional, national, or international service, the local lata switch 112 is programmed by the subscriber by simple telephone area code entries which identify the service areas to which pages or data transmissions are to be transmitted. The programming is accomplished by adding or deleting one or more area codes of the subscriber's destination field contained in a subscriber file maintained in the subscriber's local switch 112. In the United States, area codes are used for ease of subscriber use and telephone books may then serve as the service area directory. The same ease of use is available to worldwide customers with county-city code entries available from telephone books in any airport, hotel or business.

The local switch controls the generation of individual pages or data transmissions having message detail as described below with reference to FIG. 6. The number of pages or data transmissions which are generated in response to a page received without an area destination from the telephone trunk 128 or from a lata switch 114 is determined by the central processor of the local switch 112 interrogating any area destinations listed in the destination area code field of the local switch as described below with reference to FIG. 3. Each page or data transmission generated by the processor contains the same message content. A separate page or data transmission is generated for each destination area listed in the destination area code field and if the local service option of the service option field is selected, as described below, an additional page or data transmission is generated for broadcast by the local paging service 118 without an area destination in the network which is processed by the local switch 112 as a page or data transmission received from the network for broadcast by the local paging service. Furthermore, each individual page or data transmission generated by a local switch 12 contains one or more commands. The commands which are added to each page or data transmission transmitting a message are determined by the operation of the central processor of the local switch 112 in response to interrogation of the selected service options of the subscriber. Programming of receivers with the channel programming command is in response to the local switch programming the receiver to receive one or more channels, subscriber programming of destination areas of reception in the destination area code field, and the degree of utilization of the channels of the local transmitter 115.

The central processor of the local switch 112 processes each individual page or data transmission received from the network to determine if it originated from a local switch 112 or a lata switch 114. This determination is made by determining if a destination header identifying a lata switch 114 originating the page precedes the paging receiver identification code in a packet having the configuration of FIG. 6. In the absence of the header (which is a geographic identification of the originating lata switch 112 in the network) in an individual page or data transmission, the page or data transmission is processed exclusively by the local switch 112 for broadcast by the associated local paging service 118 without interrogation of a subscriber file in the local switch. If the header is found in a page or data transmission, the central processor processes the page as either a request to reprogram the subscriber file or as a page received on the telephone port 128 without an area destination which must be processed to determine one or more area destinations and be formed into new pages each with a different area destination from the area destination field if transmission by the network is to occur and into a page or data without an area destination if transmission by the local service 18 is to occur.

The local switch 112 also serves as the dynamic programming interface between the paging or data receivers 119 and the network 110. The local paging service 18 may cause channels to be received by receivers 19, change subscriber identification codes and add new customers to the network 110 utilizing the is local switch 112. The functionality of the receiver 119 can be changed from a fixed channel to a multi-channel or a scanning receiver as required by use of the channel programming command.

Messages originating at the local switch 112 which are transmitted to the lata collector switch 114 having jurisdiction over it are packetized as described below with reference to FIG. 6. Destination area codes (telephone area codes or other geographically descriptive code) are added to pages or data transmissions prior to transmission to the lata switch 114 and the receiver 119 is dynamically and automatically reprogrammed for the new service areas by the local switch 112 issuing channel programming command(s) which ensures that the receiver 119 is programmed to receive channels in each designated area. The current channels remain in the receiver 119 to avoid loss of a message while a subscriber is still in the area.

The lata switch 114 provides a second tier of network intelligence. This intelligence includes page or data transmission processing, packetizing and routing. The lata switch 114 receives packets of pages from each of the local switches 112 within its jurisdiction as well as the hub switch 116 having jurisdiction over it. The lata switch 114 provides the geographical presence for the network 110 to originate and terminate pages or data transmissions utilizing dial-up or dedicated communication services.

The lata switch 114 is responsible for collection of pages from the local switches 112 within its jurisdiction. When a packet of pages is received from the local switch 112, it is disassembled, processed and stored for transmission to the proper destination(s) in one or more packets each consisting of one or more pages which are intended for destination(s) either within or outside the lata switch jurisdiction. The lata switch 114 periodically transmits packets of pages stored in its outbound hub buffer and its outbound local buffer to the associated hub switch 116 having jurisdiction over it and to local switches 112 within its jurisdiction which provides cost efficient transmission and efficient processing by avoiding processing by a single central switch controlling the network 110. This architecture is highly efficient in routing pages or data transmissions originating within the jurisdiction of the lata switch 114 which are intended for broadcast outside its jurisdiction as well as distributing pages or data transmissions from one local switch 112 to one or more additional local switches within the jurisdiction of the lata switch. If the page or data transmission is destined for distribution within the jurisdiction of the lata switch 114, the page or data transmission is processed into packets for transmission to each of the local switches 112 within its jurisdiction or alternatively to less than all of the local switches in its jurisdiction. The pages or data transmissions are then periodically transmitted as packets to the local switches 112 within the jurisdiction of the lata switch 114.

The lata switch 114 is also responsible for collection of pages outside its jurisdiction to be broadcast to the local switches 112 within its jurisdiction. Packets received from the hub switch 116 are disassembled, processed, and packetized for transmission to the destination local switches 112.

The function of the lata switch 114 in collecting requests for placing pages or data transmissions in the network or to reprogram the subscriber file of a local switch 112 by placing a local phone call on telephone trunk 126 is an important aspect of the network. The lata switch 114 places the header discussed above, which geographically identifies the lata switch originating the page or data transmission in front of the receiver identification code, in a packet as illustrated in the message detail of FIG. 6 to enable the local switch 112 to differentiate between pages or data transmission which are for broadcast by the local service 118 associated with a receiving local switch 112 and pages or data transmission which requite access to the subscriber files to generate one or more pages or data transmissions for broadcast or for reprogramming a subscriber file. Preferably, the header is four digits comprised of a country code followed by the telephone area code identifying the lata switch 114 which received the call for the originating page or data transmission.

The hub switch 116 provides the third tier of network intelligence and serves as an inter-regional communications link. One hub switch 116 will preferably be located in each international region to serve as a network routing switch. In the United States, a hub switch 116 will be located within the region served by each of the Bell regional companies (RBOC's). Accordingly, in the United States the preferred implementation of the network 110 includes seven distinct hub switches 116. Each hub switch 116 in a preferred embodiment can have fifty-five lata switches 114 under its jurisdiction. The hub switch 116 also serves as a network routing switch for inter-hub calls when pages or data transmissions are to continue in the hub-to-hub network.

When a packet of pages is received from either another hub switch 116 or a lata switch 114 within its jurisdiction, the pages or data transmission are disassembled for examination. Each page or data transmission is examined for its destination address(es). A determination is made if the hub switch 116 should forward the page or data transmission to one of the six adjacent hub switches or forward the page or data transmission to a lata switch 114 within its jurisdiction. The pages or data transmissions are then destination processed and packetized for transmission to either another hub switch 116 or a lata switch 114 within its jurisdiction.

FIG. 3 illustrates a memory map of the RAM of a local switch 112. The RAM has four main storage areas which are the subscriber files 154, channel files 156, lata buffers 158 and local buffers 160.

Each local switch 112 is allocated a capacity of, for example, 10,000 subscribers which are identified by a four-digit code stored in field 162 of the subscriber files 154.

Field 164 stores the subscriber's local telephone number within the area code serviced by the lata switch 114 having jurisdiction.

Field 166 is the subscriber's receiver identification code which uniquely identifies the subscriber and the receiver 119 of the subscriber which is to receive pages or data transmissions throughout the network 110. The receiver identification number (code) consists of 8 digits with the four most significant digits geographically representing the area serviced by the associated lata switch 114 (country code as the most significant digit followed sequentially by area or city code lesser significant digits) and the four least significant digits being digits assigned to identify 10,000 subscribers within the jurisdiction of the local switch. The capacity of the network 110 is 100 million subscribers with the eight digit identification code. The least significant numbers of the identification code define subscribers of a specific local switch 112 within the jurisdiction of the lata switch 114.

Field 168 stores the service options which each subscriber may choose to have provided by the local service 118. The service options control the commands, which are used with pages or data transmissions sent to the receivers 119. The main CPU interrogates the particular subscriber file identified by the identification code inputted with the request for a page or data transmission by telephone trunks 126 or 128, causes storage of the page or data transmission, determines the destination(s) of the page or data transmission and the appropriate system command to be used to transmit the page or data transmission. It should be understood that the service options may be dynamically programmed through voice prompted communications over the telephone trunk lines 128 with the local switch 112 and through telephone calls to the lata switch 114 by trunk 126 as described below.

The service options are described as follows. The service option "a" is for no service which is a condition when an active subscriber does not wish to receive any pages or data transmissions such as may occur when the subscriber is on vacation or is otherwise desirous of not being reached for a period of time but does not wish to be removed from the subscriber base of the system. The service option "b" is for pages or data transmissions to be broadcast only by the transmitter 115 of the local service 118. The service option "c" is for regional service which is for pages or data transmissions to be broadcast throughout all of the local services 118 which are within its lata switch jurisdiction. The service option "d" is for national service which is for pages or data transmissions to be broadcast from the local switch 112 to one or more lata switches 114 other than the lata switch having jurisdiction over the local switch. While not illustrated, an international service option may be added. The service option "e" is for a repeat of pages or data transmissions for any of the "b", "c" or "d" service options so that a page or data transmission is broadcast more than once. The service option "f" is for data service which causes the page or data transmission to be stored in a specified section of the receiver memory. The service option "g" is for external data service which commands the receiver 119 to output the page or data transmission to the external data port of the receiver. This option permits the receiver 119 to support peripheral devices such as printers or processors to provide a wide range of data services.

The following additional fields are provided. The fifth field 170 is the subscriber's name and the subscriber's specified account number. The sixth field 172 is the subscriber's account number entry for purposes of interval billing by the local service 118. The seventh field 174 is the subscriber's count (local, regional or national) which is a total of the number of pages or data transmission made in a billing period. The eighth field 176 is the total number of data characters sent during the billing period.

The ninth field 178 is the destination (area code(s)) of each of the pages or data transmissions. For local service, there is no area code specified. For regional service, the area code of the associated lata switch 114 having jurisdiction over the local switch 112 is specified and for national and international service, one or more area codes or other geographic identification identifying lata switches other than the lata switch having jurisdiction over the local switch are specified. For international service, a country code may be used to identify lata switches 114 within a particular country. Any number of area codes may be specified but in a preferred embodiment of the network 110, three area codes is a maximum number of lata switches 114 which may be specified as regions to receive pages from the local switch 112.

The above-referenced description describes the first file of the n (10,000) possible subscriber files stored in the subscriber files 154. It should be understood that the other subscriber files have the same configuration. Access to the subscriber file is obtained by a voice prompted message requiring the inputting of a secret code which if inputted correctly is followed by voice prompted requests requesting specification of the information of the subscriber file to be changed.

The frequency files 156 perform an important function in the network 110. The frequency files 156 contain n possible lata files with each individual file identifying up to, for example, 15 four-digit numbers that represent broadcast channels available within the service area of a lata switch 114. Thus, each of the individual lata switches 114 in the network 110 will have a separate frequency file which identifies all of the channels which are available to transmit pages or data transmissions from the transmitters 115 associated with the local services 118 under the jurisdiction of that lata switch 114. The channels are stored as a four-digit number in a hexadecimal numbering system which requires only four digits of space. A file containing all zeros (no channel) will cause an invalid area code message to be returned to a subscriber attempting to reprogram service areas. The frequency files are the source of channels which are utilized by the channel programming command to program each receiver 119 for operation in each lata switch jurisdiction and the local switch jurisdiction. For example, a receiver 119 which is to be serviced by only a single local service 118 may be programmed to receive only a single or a number of channels up to the number of channels used by that local paging service. Furthermore, for regional service or national service, the frequency files 156 are used to program the receiver 119 to receive pages or data transmissions from the channels used by the local services 118 within the designated area codes representative of the service areas serviced by the lata switches 114. Furthermore, if a receiver 119 is to be programmed to receive messages in a particular area serviced by a lata switch 114 as a consequence of the subscriber travelling, the channel programming command utilizes the channels stored in the file number corresponding to the jurisdiction of the lata switch 114 in the area to which the subscriber is to travel, to dynamically program the channel(s) which the paging receiver is to receive in that area. For service in a local region, the frequency files are used as a source of channels to be used by the channel programming command to dynamically shift the channels on which the paging receiver is to receive a page, to adjust the channels used in the broadcast area used by the local service 118 associated with the local switch 112 based on the amount of traffic on each channel and to further provide a source of channels which are to be used for specialized services for transmitting particular types of information to particular subscribers such as, but not limited to stock quotations.

The lata buffers 158 consist of an inbound lata buffer 180 and an outbound lata buffer 182. The inbound lata buffer 180 functions to receive pages or data transmissions coded in ASCII which have been processed to strip the X.25 transmission protocol used for transmitting pages from the lata switch 114 to the local switch 112 and converted from the hybrid code described below to ASCII. Pages or data transmissions which are initially stored in the inbound lata buffer 180 are processed for destination and are either for broadcast by the associated local service 118 in which case they are ultimately stored in the appropriate identification code buffer 186 which matches the least significant digit of the identification code contained with the page or data transmission or in the outbound lata buffer 182 if the page or data transmission originated from one of the lata switches 114 by calling on the telephone trunk 126 and which has a final destination which is determined by the field 178 of the subscriber file 154.

The local buffers 160 are comprised of an inbound buffer 184 for receiving all local inbound pages or data transmission which originate from the trunk line 128 which is connected to the local switch 112 and a plurality of identification code buffers 186 which are each individually assigned to store outbound pages or data transmissions with a particular least significant identification code digit of the number base used for the subscriber identification code which are to be transmitted to a receiver 119. All of the received pages or data transmissions from the local switch 112 are initially stored in the buffer 184. Each of the individual identification code buffers 186 stores pages or data transmissions for broadcast by the local service 118 in batches which are grouped by the least significant digit of the subscriber identification code received with the page or data transmission after sorting by the CPU. In other words, the least significant digit of the subscriber identification code within a page or data transmission for broadcast by a local service 118 determines in which of the identification code buffers 186 the page or data transmission is stored. For example, if the last digit of the identification code of a page or data transmission for broadcast by the local service 118 ends in the digit 0, the page or data transmission is stored in the identification code buffer identified by "0".

FIG. 4 is a memory map of the random access memory of the lata switch 114. The random access memory has three main areas and two optional areas. The three main areas are hub buffers 188, local buffers 190 and a lata identification code (ID) memory 192. The optional memory areas are an all call buffer 194 for storing nationwide pages or data transmissions received from the hub switch 116 which are to be transmitted to all of the local switches 112 under the jurisdiction of the lata switch 114 and an all call buffer 196 which stores pages or data transmissions received from one of the local switches 112 which are to be transmitted to all of the local switches under the jurisdiction of the lata switch 114.

The hub buffers 188 are an outbound hub buffer 198 and an inbound hub buffer 200. The outbound hub buffer 198 stores pages or data transmissions to be periodically transmitted to the hub switch 116 having jurisdiction over the lata switch 114 under the control of the CPU. The inbound hub buffer 200 stores pages or data transmissions which are periodically received from the associated hub switch 116 via storage in a buffer of the CPU.

The local buffers 190 are comprised of an inbound local buffer 202 which stores groups of inbound pages or data transmissions received from the local switches 112 and a plurality of outbound local buffers 204 each of which store groups of pages or data transmissions which are to be transmitted periodically to a specific one of the local switches with a separate outbound local buffer being provided for each of the local switches under the jurisdiction of the lata switch 114. The CPU processes each of the pages or data transmissions which is received in the inbound buffers 200 and 202 by destination and causes storage in the outbound buffers 198 and 204 which is associated with the destination of the page or data transmission.

The lata identification code memory 192 stores the subscriber identification numbers of all of the subscribers which are associated with each of the local switches 112 within its jurisdiction. The lata identification code memory 192 is used for determining the local switch 112 which stores a subscriber file of the subscriber used for pages or data transmission which are inputted to the system from a direct call by telephone trunk 126 to a lata switch 114 or from a direct call by telephone trunk 126 to a lata switch by a subscriber to program the reception area of pages or data transmissions by changing the destination 178 of the pages or data transmissions. The lata identification code memory 192 may be organized by subscriber identification codes which are within the jurisdiction of each local switch 112 so that the matching of an identification code of a page or data transmission inputted to the lata switch 114 in the lata identification code memory 192 provides the location of the particular local switch which stores the subscriber file 154 of that subscriber.

In order to avoid having to provide additional storage space in each of the outbound local buffers 204, the optional all call buffer 194 may be provided to store a single page or data transmission, received from the hub switch 116 having jurisdiction over the lata switch 114, which is to be transmitted to each of the local switches 112. Similarly, the optional all call buffer 196 may be provided for receiving pages or data transmissions from an individual local switch 112 which are to be transmitted to all of the local switches within the jurisdiction of the lata switch 114.

For pages, data transmissions or requests to reprogram the subscriber file 154 which are made to a lata switch 114 over telephone trunk 126 which require access to a subscriber file outside the jurisdiction of the lata switch, the CPU forms a page or data transmission contained in a packet having an area destination identified by the four most significant digits of the identification code inputted to the lata switch 114 preceded by the identification code of the receiver 119 to receive the page or data transmission, preceded by the geographical area identification of the lata switch receiving the call to originate a page or data transmission or to program the subscriber file which is transmitted by the network 110 to the specified area destination. For pages or data transmissions to be billed to subscribers stored in the subscriber file 154 of a local switch 112 within the jurisdiction of the lata switch 114 or requests to program the subscriber file 154, the CPU forms a packet having an area destination of the local switch 112 within its jurisdiction which stores the subscriber identification code as determined by interrogation of the lata identification code buffer 192 by the CPU. The ultimate destination of a page or data transmission is determined by the destination field 178 of the subscriber file 154 matching the identification code of the receiver 119 either within or outside the jurisdiction of the lata switch that is called in over telephone trunk 126. The local switch 112 containing the subscriber file 154 creates the one or more pages or data transmissions in accordance with the information in the subscriber file including the adding of destination(s) and the appropriate command. Transmission of the pages or data transmissions created by the local switch 112 in response to a call to a lata switch 114 is identical to the transmission of pages or data transmissions originating at the local switch 112 by the placing of a telephone call on telephone trunk 128. In the case of requesting programming of the subscriber's file 154, the caller must in response to a voice prompted message enter a four-digit secret identification code to obtain access to the subscriber file with voice prompted messages being supplied under the control of the CPU to control the input of programming information from the subscriber. To request a page or data transmission by calling the lata switch 114, the caller will receive a voice prompted message to enter the subscriber identification code and then the appropriate page or data transmission.

FIG. 5 is a memory map of the random access memory of the hub switch 116. The hub switch memory map is comprised of four main parts which are hub buffers 206, lata buffers 208, lata code tables 210 and hub routing codes 212. The hub buffers 206 are comprised of a plurality of inbound hub buffers 214 which correspond in number to the number of other hub switches 116 in the network 110 which have direct connection to the hub switch and a corresponding number of outbound hub buffers 216. The individual inbound hub buffers 214 each store pages or data transmissions received from one of the hub switches 116 with pages or data transmissions received from each adjacent hub switch 116 being stored in only a single one of the inbound hub buffers 214. Similarly, pages or data transmissions which are to be transmitted to another hub switch 116 are stored in the outbound hub buffer 216 which is associated with the destination hub switch to which they are being transmitted with all pages or data transmissions which are to be routed to a single hub switch being stored in a corresponding one of the outbound hub buffers 216 with a separate hub buffer being associated with each hub switch to which pages or data transmissions are directly transmitted. The lata buffers 208 are comprised of a plurality of inbound lata buffers 218 which correspond to the number of lata switches 114 under the jurisdiction of the hub switch 116. The inbound lata buffers 218 store all of the pages or data transmissions received from the lata switches 114 under the jurisdiction of the hub switch 116. The outbound lata buffers 220 correspond in number to the lata switches 114 under the jurisdiction of the hub switch 116 with a separate lata buffer being associated with each of the lata switches. The outbound lata buffers 220 store groups of pages or data transmissions to be periodically transmitted to their associated lata switch 114. Pages or data transmissions which are stored in the inbound hub buffers 214 are processed by destination by the CPU and stored in either the outbound hub buffer 216, which is the destination of the pages or data transmissions not to be received by a lata switch 114 under the jurisdiction of the hub switch 116, or in one or more of the outbound lata buffers 220 if the destination of the packets received from another hub switch 116 is a lata switch under the jurisdiction of the hub switch. The CPU also processes the pages or data transmissions stored in the inbound lata buffers 218 according to their destination and causes their storage in either the outbound hub buffers 216 if the pages or data transmissions are to be sent to a lata switch 114 outside of the jurisdiction of the hub switch 116 or to one or more of the outbound lata switches 220 if the pages or data transmissions are to be received by one or more lata switches 114 under the jurisdiction of the hub switch 116.

The lata code tables 210 store each of the lata (telephone area or other geographic identifier) codes 222 under the jurisdiction of the hub switch 116 which are utilized by the comparison performed by the CPU with the pages or data transmissions stored in the inbound hub buffers 214 and inbound lata buffers 218 to determine in which of the outbound hub buffers 216 or outbound lata buffers 220 the pages or data transmissions should be stored. Each separate lata code 222 corresponds to the geographical identification of the lata switch 114 which in the preferred embodiment is the telephone area code of a lata switch's jurisdiction.

The routing codes 212 determine the transmission routes to other hub switches on a priority basis to which a packet should be sent which are not intended for a lata switch 114 within the jurisdiction of the hub switch 116. It should be understood that a number of factors may be considered in choosing the priority of a route to be used to transmit a packet from one hub switch 116 to another hub switch. It would appear on first analysis that a direct first hub switch to second hub switch route would be best but often the switching overhead of routing a packet through one or more intermediate switches is more than compensated for by the efficiency of a route having one or more intermediate hub switches by adding additional pages or data transmissions to the packet which are inputted to the one or more intermediate hub switch(es) to the packets being transmitted to the second hub switch. The CPU compares the destination of the groups of pages or data transmissions stored in the inbound hub buffers 214 and the inbound lata buffers 218 to determine if these pages or data transmissions should be routed to another hub switch 116. The hub routing codes 212 are referred to by default when a match is not found by the CPU in comparing the destination of the pages or data transmissions stored in the inbound hub buffers 214 and inbound lata buffers 218 with the codes stored in the lata code tables 210. Each page or data transmission stored in the inbound hub buffer 214 and inbound lata buffers 218 is processed by destination by the CPU and caused to be stored in the outbound buffers 216 and 220 which correspond to its destination. Each individual hub routing code contains the hub switch destination priorities for pages or data transmissions to be sent to a single lata switch 114 outside the jurisdiction of the hub switch 116. For example, for the lata switch 114 having jurisdiction over area code 312, the hub routing code 234 determines the priorities in descending order from the highest priority to the lowest priority such that the highest priority hub would be #1 followed by #2-#6.

FIG. 6 illustrates a preferred transmission protocol to be used for transmitting packets between switches. The protocol which is used is a modified X.25 protocol. As illustrated, each packet contains five separate layers. The first layer is the destination telephone number which is the receiving port to receive the page or data transmission. With reference to FIG. 2 if a packet of X.25 formatted pages or data transmissions were to be sent from a first lata switch 114 to its associated hub switch 116 over communication path 120, the destination telephone number would be the telephone number of the hub switch. It should be further understood that the X.25 transmission protocol as described herein may be utilized with other types of communication mediums between switches such that a destination telephone number may be replaced with another form of address of the receiving switch. The second layer indicates the packet size field in terms of succeeding layers of information. In the present case levels 3, 4 and 5 are provided which dictates that the packet size would store the number 3 to indicate the subsequently lower third, fourth and fifth layers. The third layer contains an origination switch address and a destination switch address which can be either telephone numbers or real addresses within the network 110. The fourth layer is the number of pages or data transmissions which are contained in a packet. As illustrated, this number may be any integer n. The fifth layer is one or more pages or data transmissions which each correspond to an individual page or data transmission to be sent to a particular receiver 119.

Each message includes the following information. In accordance with standard X.25 protocol, a beginning of file header is included. Following the beginning of file header is a receiver I.D. code which is the identification code of the destination receiver which is identical to the subscriber identification code stored in the subscriber files 154 of the subscriber to receive the page or data transmission. Following the I.D. code is the destination(s) of the page or data transmission which is geographically descriptive of the area to which the page or data transmission is to be transmitted and is added by the local switch 112 interrogating the destination field 178 of FIG. 3. In the preferred embodiment, the destination is a combination of country and area code as utilized by the telephone system to identify the area to which the page or data transmission is destined. For each country, the same country code will be used so that if the system 110 as illustrated in FIG. 1 were to be utilized for the United States, the first digit of the destination would be a 1. Similarly, the destinations in other countries would be followed by different numbers identifying those countries followed by code which breaks up the identified country into smaller geographic regions. It should be understood that a destination which is not based on the telephone system is equally usable. The field of special commands are the system commands which are transmitted with each page or data transmission to a receiver. The "page" or "data transmission" is the part which is to be displayed to the bearer of the receiver 119 and may be numeric or alphanumeric characters. The end of the file and file size information are part of a standard X.25 protocol.

FIG. 7 illustrates an interconnection between a paging receiver (left side) in accordance with the above-referenced receiver patents and a printer (right side) which has been offered for sale by Telefind Corporation of Coral Gables, Fla. The "EXTERNAL ANTENNA" pin is for connection only to an external antenna and connects the RF signal from the external antenna to the receiver internal antenna. The "LINK" pin is detected by the printer to determine if the receiver 119 is connected or not. If the receiver is not connected when peripheral power is on, then the CPU of the printer will detect that the "LINK" pin is high. Otherwise the "LINK" pin will be low. The pin "EXTERNAL BUZZER" outputs a 2 KHz trigger signal when a page or data transmission is received. The "EXTERNAL BUZZER" pin also outputs the 2 KHz trigger signal when display of a message is complete. The pin "PRG VCC" is supplied 5 volt power by the attached printer to provide power to the receiver 119 whether the pager is powered or not. The "GROUND" pin is ground for the printer and receiver 119. The pin "BUSY" is pulled high by the printer if the printer is too busy to handle input data bits on the "PRTDATA" pin of the receiver 119. The "PRTDATA" pin is the data output from the receiver 119 to the printer. Serial data bits are fed to the printer to drive the printer to generate text corresponding to the data bits. The "DIS AUDIO" pin provides external audio which may be the X.25 modified protocol of FIG. 6 encoded into audio tones which modulate the channel carrier on which information is received by the receiver 119. When the "DIS AUDIO" pin is high, it indicates that the display button is pressed. The memory of the receiver 119 stores the text to be printed by the printer. The text is downloaded through the aforementioned interconnection upon connection to the printer to generate a hard copy of the text stored in the memory.

DISCLOSURE OF INVENTION

The present invention provides an integration of an electronic mail system with an RF information transmission network for transmitting electronic mail originating at processors either within or outside an electronic mail system by RF communication to at least one destination processor within an electronic mail system by a RF receiver which transfer the information to the destination processor and method of use thereof. The RF receiver stores the received information which is to be transferred to the destination processor. Storage in the RF receiver memory permits the reception of the information without a connection of the RF receiver to the destination processor thus eliminating the requirement that the destination processor is turned on and carried with the user of the destination processor. In a typical application with a portable PC functioning as the destination processor, it is important that reception of the information by the RF receiver does not require the drawing of power from the PC battery. The RF receiver automatically transfers the information to the destination processor upon connection of the RF receiver to the destination processor. The destination processor may be within the same electronic mail system containing the originating processor which originated the information or another electronic mail system. While a preferred application of the invention is with portable destination processors, it should be understood that the originating and destination processors may be at a fixed site or portable. The use of the RF receiver to receive electronic mail permits fixed site destination processors to receive electronic mail without calling the electronic mail system as in the prior art by using the storage of the RF receiver which may be carried on the user of the destination processor either within an office or other site or for travel. The RF receiver provides the automatic storage of electronic mail and review of its content without interaction with the destination processor. The stored messages may be transferred at a later time automatically without manually keying the message which is an important consideration in using portable PC's. The problems of the prior art in delivering electronic mail to destination processors within an electronic mail system which are being exacerbated by the increasing portability of personal computers and the absence of a current system for delivering electronic mail between electronic mail systems are overcome by the present invention.

The present invention transmits electronic mail from an originating processor to at least one destination processor through an interface switch. The interface switch connects an electronic mail system and/or at least one additional processor to an RF data transmission network which transmits the information to a RF receiver which is connectable to the destination processor to transfer the received RF message from the RF receiver to the destination processor.

The invention is user friendly in that the minimum amount of information which must be provided to initiate the transmission of electronic mail from an originating processor to at least one destination processor is an identification of the destination processor and information indicating that the message is to be sent by the RF information transmission network. The inputting of information that the information is to be sent by the RF information transmission network may be simplified to the extent that an icon driven display associated with the originating processor, such as a mouse, may be used to point to an icon of a radio receiver. Alternatively, an identification of the address of the interface switch through which the information is transmitted to the RF transmission network may be inputted by the operator or a machine operating the originating processor. Finally the entering of the destination processor identified in terms such as the user's name may be entered which is compared with a look up table to determine if a match exists. If a match exists, the matched identification of the destination processor supplies an address of the interface switch and an identification of an RF receiver to receive the information and transfer information it to the destination processor. The inputting of the destination processor in terms such as the user's name to an originating processor may be used by the destination processor, gateway switch or addressed interface switch to look up an identification number of the RF receiver within the RF information transmission network which is connectable to the destination processor which is added to the information for use by the RF information transmission network. The electronic mail system or the interface switch may append the identification number of the RF receiver to receive the information which is utilized by the RF information transmission network to determine the final destination of the RF receiver to which the message is broadcast by the RF information transmission network. The appending of the identification number of the RF receiver to the information to be broadcast to the destination processor may be inputted by an operator of the originating processor, added to the information by a comparison of the identification of the destination processor to stored identifications of destination processors stored by the originating processor to which RF messages are to be broadcast by the RF information transmission network to identify the identification number of the RF receiver in the RF information transmission network, or by a gateway switch in the electronic mail system or the interface switch between the electronic mail system and the RF information transmission network.

The intelligence for determining the identification number of the RF receiver to receive the information is less expensive and operates most efficiently when placed within the interface switch where the aforementioned matching may be produced without requiring modification of either individual originating processors within the electronic mail system or gateway switches within the electronic mail system which have additional functions for supporting other conventional aspects of electronic mail. However, the determination of an identification number of the RF receiver which transfer the information to the destination processor may be located anywhere between the originating processor and the RF information transmission network for practicing the present invention. Similarly, the appending of the address of the interface switch to which the information is transmitted by the electronic mail system for entry into the RF information transmission network for broadcast to the RF receiver for transfer to the destination processor may be located within any one of the originating processor, gateway switch or interface switch.

An electronic mail system for transmitting information from one of a plurality of originating processors to at least one of a plurality of destination processors in accordance with the invention includes at least one gateway switch, a gateway switch storing information received from one of the at least one originating processor prior to transmission of the information to the at least one destination processor; an RF information transmission network for transmitting stored information received from one of the at least one gateway switch by RF transmission to at least one destination processor; at least one interface switch, an interface switch connecting a gateway switch to the RF information transmission network and transmitting stored information received from one of the at least one gateway switch to the RF information transmission network; and wherein the information is transmitted to a receiving interface switch by the electronic mail system in response to an address of the receiving interface switch which has been added to the information originated by the originating processor by either the originating processor or gateway switch and the information is transmitted from the receiving interface switch to the RF information transmission network with an address of the destination processor to receive the information which has been added by either the originating processor, a gateway switch or the receiving interface switch. The destination processors may be transported during operation by a user. The receiving interface switch removes information added by the electronic mail system to the information originated by the originating processor from the stored information received from one of the at least one gateway switch and adds information used by the RF information transmission network during transmission of the information to the information originated by the originating processor to an RF receiver in the RF information transmission network which receives the information and transfer the information originated by the originating processor to the destination processor. The RF receiver may be detached from the destination processor during reception of the information with a memory of the RF receiver storing the information. Storage in memory permits review of the information prior to transferring the information to the destination processor by connection the RF receiver to the destination processor. The address of the destination processor is preferably an identification of a RF receiver in the RF information transmission network which receives the information and transfers it to the destination processor.

The receiving interface switch stores information which has been stored by at least one gateway switch that is received from a plurality of originating processors, assembles the information from a plurality of originating processors into a packet and transmits the packet to the RF information transmission network. The RF information transmission network comprises a switch which receives the packet from the receiving interface switch and disassembles the packet into information from the plurality of originating processors. The RF information transmission network transmits the disassembled information, including the identification number of the RF receiver, to a switch in the RF information transmission network storing a file identified by the identification number and any destination of the RF receiver in the RF information transmission network to which the information and identification number is to be transmitted by the RF information transmission network. The switch adds any destination of the RF receiver to the information and the RF information transmission network in response to any added destination transmits the information and identification number to the destination for RF broadcast to the RF receiver for relaying to the destination processor.

The electronic mail system also transmits information between an originating processor and at least one destination processor through either a public switch or a private switch telephone network without transmission by the RF information transmission network. The destination processor is addressed by a different address during transmission to the destination processor when using the public or private switch telephone network than during transmission by the RF information transmission network.

The RF receiver is connectable to the destination processor and in response to connection of the RF receiver to the destination processor the RF receiver transfers information stored in a memory of the RF receiver received from the originating processor to the destination processor. The number of originating processors is greater than a number of interface switches. The plurality of originating processors also function as destination processors with a RF receiver coupled thereto.

The address of the receiving interface switch may be added to the information originated by the originating processor by a gateway switch. The address of the receiving interface switch may be added by the gateway switch by matching an identification of the destination processor such as a name of a user of the destination processor with a stored identification of a destination processor and adding an address of an interface switch stored with the matched identification of the destination processor to the information as the address of the receiving interface switch.

The address of the receiving interface switch may also be added by the originating processor. The address of the receiving interface switch may be added by an inputting of the address of the receiving interface switch along with an identification of the destination processor by an operator or a machine using the originating processor or by matching an identification of the destination processor, such as the name of the user, with a stored identification of a destination processor and adding an address of an interface switch stored with the matched identification of the destination processor to the information as the address of the receiving interface switch.

The address of the destination processor, which preferably is an identification number of a RF receiver receiving the information and transferring the information to the destination processor, may be added to the information originated by the originating processor by an operator or a machine using the originating processor. The identification number may also be added to the information originated by the originating processor by matching an identification of the destination processor, such as a user of the destination processor, with a stored identification of a destination processor and adding an identification number stored with the matched identification of the destination processor to the information as the identification number.

The address of the destination processor may also be added to the information originated by the originating processor by the gateway switch. The identification number may be added by the gateway switch by matching an identification of the destination processor, such as a name of a user of the destination processor, with a stored identification of a destination processor and adding an identification number stored with the matched identification of the destination processor to the information as the identification number.

The address of the destination processor may also be added to the information originated by the originating processor by the receiving interface switch. The identification number may be added by the receiving interface switch to the information originated by the originating processor by matching an identification of the destination processor, such as a name of a user of a destination processor, with a stored identification of the destination processor and adding an identification number stored with the matched identification of the destination processor to the information as the identification number.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 illustrates a prior art electronic mail system.

FIG. 2 illustrates a prior art paging system used by the present invention.

FIG. 3 illustrates a memory map of the local switch of the prior art paging system of FIG. 2.

FIG. 4 illustrates a memory map of a lata switch of the prior art paging system of FIG. 2.

FIG. 5 illustrates a memory map of a hub switch of the prior art paging system of FIG. 2.

FIG. 6 illustrates a message format utilized by the prior art paging system of FIG. 2.

FIG. 7 illustrates a prior art connection between a receiver in the paging system of FIG. 2 and a printer.

FIG. 8 illustrates a block diagram of a system in accordance with the present invention.

FIG. 9 illustrates a block diagram of the connection of a plurality of electronic mail systems through a plurality of interface switches to an input port of an RF information transmission network utilized by the present invention.

FIG. 10 illustrates a block diagram of the transmission of information originating from a plurality of electronic mail systems to an RF information transmission network to a plurality of destination processors and originating processors within a plurality of electronic mail systems in accordance with the present invention.

FIG. 11 illustrates possible distributed functions for performing data processing steps necessary to transmit information from an originating processor to a destination processor using RF transmission in accordance with the present invention.

FIG. 12 is a block diagram of an interface switch in accordance with the present invention.

BEST MODE FOR CARRYING OUT THE INVENTION

FIGS. 8-10 illustrate a block diagram of an electronic mail system 100 which has been integrated with an RF information transmission network 302 for transmitting information from an originating processor within the electronic mail system to a destination processor within the electronic mail system utilizing RF communications in accordance with the present invention. Like reference numerals identify like parts in FIGS. 1-10 and 12. The integrated system 100 differs from the prior art of FIGS. 1-7 in that the originating processor, which may be any of the processors within computing systems #1-#N is provided the option of transmitting electronic mail (information) to at least one destination processor which may be any processor A-N within the processing systems #1-#N by means of an RF information transmission network 302 as described below. It should be understood that the present invention is not limited to the block diagram form of FIGS. 8-10 and 12. Additionally, the communications between the originating processors, gateway switches 14 and destination processors may be through either a public or private switch telephone network 314 and are not limited to any type of telephone system interconnection. The RF information transmission network 302 functions to transmit the information which originated from one of the originating processors A-N within any of the computing systems #1-#N to the destination processor A-N within any of the computing systems #1-#N by an RF transmission to an RF receiver 119. The RF receiver 119 is connected to the destination processor with the same connections as illustrated in the prior art of FIG. 7. When the RF receiver is connected to the SAFARI™ computer, the connection is powered by the SAFARI computer. Upon connection, the receiver 119 relays the information from the RF receiver to the destination processor. An important aspect of the present invention is that reception and review of electronic mail can be performed without connection of the RF receiver 119 to the destination processor A-N which permits the receiver to function as a mobile electronic mail receiver. As a result, the user may move from the site of the destination processor A-N either within an office or other location or during travel while receiving electronic mail which was not possible with the prior art. Furthermore, the connection of the RF receiver 119 to the destination processor automatically transfers the electronic mail stored within the memory of the RF receiver to the destination processor without manual keyboarding. A computer program for controlling the transfer of information from the receiver 119 to a SAFARI™ laptop computer of AT&T Corporation is contained within the attached Appendix at pages 1-9. This program automatically provides transfer of the stored electronic mail stored within the memory of the RF receiver 119 into the destination processor A-N where it is accessible to application programs within the destination processor. As a result, the deficiencies of the prior art in requiring substantial expense consequent from the making of telephone calls, substantial labor resultant from the lost time of persons making telephone calls and the inability to deliver electronic mail messages and the more difficult problem of delivering electronic mail messages to portable processors is overcome. Moreover, as is explained in detail below in conjunction with FIG. 11, the initiation of an information transmission from an originating processor A-N to a destination processor A-N using an RF transmission by the RF information transmission network 302 to an individual RF receiver has many different options which are user friendly. The initiation of the transmission of information from an originating processor A-N to a destination processor A-N using RF Transmission by the RF information transmission network 302 only requires the identification of an address of the RF receiver, which preferably is the identification number of the receiver 119 in the RF information transmission network and the designation of an address of an interface switch in the form of an address such a "TF MOBOX" which connects the electronic mail system to the RF information transmission network as described below in conjunction with FIGS. 9 and 10. The initiator of an electronic mail message, in the most user friendly form of the invention, is only required to input into the originating processor A-N an identification of the destination processor A-N which typically is in the form of a name such as "John Doe". The distributed intelligence of the system implementing the present invention, which may be located in any one of the originating processors A-N, gateway switch 14 or interface switch 304 or distributed therebetween as described below with reference to FIG. 11, may be used to add the necessary address of the interface switch connecting the electronic mail system 1-N to the RF information transmission network 302 and the identification of the RF receiver 119 in the RF information transmission network from the inputting of only an identification of the destination processor A-N. The addition of the identification number of the RF receiver 119 and the address of the interface switch may be implemented by the originating processor A-N of one of the computing systems #1-#N, a gateway switch 14 or an interface switch 304 as described below with reference to FIG. 9.

FIG. 9 illustrates a block diagram of the connection between a plurality of gateway switches with mailboxes 14 in different electronic mail systems to the RF information transmission network 302. It should be understood that multiple gateway switches with mailboxes 14 from a single electronic mail system 1-N may be connected to each interface switch 304 instead of the connection of a single gateway switch with mailbox to a single interface switch as illustrated. A plurality of interface switches 304 connect information transmitted from at least one electronic mail system as illustrated in FIG. 8. Optionally, a plurality of electronic mail systems 1-N each as illustrated in FIG. 8 are connected to a data input port of the RF information transmission system which is preferably hub switch 116 of the prior art paging network described above with reference to FIGS. 2-6. The dotted line communication paths 306 illustrate optional information transmissions in which information from a plurality of different electronic mail systems is concentrated at a single interface switch 304. The dotted line communication paths 307 illustrate connections to additional gateway switches with mailboxes 14 within electronic mail systems 1-N.

The function of the interface switches 304 is twofold. In the first place, the interface switches 304 function as a security check to determine that information transmissions originating from a gateway switch with mailbox 14 represent transmissions which should be coupled to a hub switch 116 of the RF information transmission network 302. The security check is performed by the interface switch 304 comparing the identification number of the RF receiver 119 which has been added by either an originating processor A-N or a gateway switch with mailboxes 14 with permissible identification numbers or the interface switch performing the addition of the identification number. The interface switch 304 also removes information added by the electronic mail system 1-N to the information originated by the originating processor A-N from the stored information received from one of the gateway switches 14 and adds information used by the RF information transmission network 302 during transmission of the information originated at the originating processor to a RF receiver 119 in the RF information transmission network 302 which receives the information and transfer it to the destination processor A-N. Additionally, the interface switch 304 encodes data, which is required to format the display of the CRT of the destination processor for the electronic mail system to which the destination processor is connected, in the form of a character or characters which are decoded by either the RF receiver 119 or the destination processor A-N and added in decoded form back to the information which is processed by the destination processor with a format of the electronic mail system to which the destination processor A-N is connected.

The interface switches 304 function to store information which has been stored by at least one gateway switch 114 that is received from a plurality originating processors, assemble the information from a plurality of originating processors into a packet preferably having the format of that described above with reference to the prior art in FIG. 6 and transmit the packet to the hub switch 116 within the RF information transmission network 302. While the invention is not limited to the transmission of the packets from the interface switch 304 to the hub switch 116 of the RF information transmission system 302, the hub switch is the preferable node in the RF information transmission network to which communications from the gateway switches 14 should be transmitted as a consequence of it having jurisdiction over both lata switches 114 and the local switches 112 in the RF information transmission network which results in lesser network overhead.

The hub switch 116 receives the packet from the receiving interface switch 304 and disassembles the packet into information from the plurality of originating processors either within a single electronic mail system such as system 1 or from a plurality of electronic mail systems, such as systems 1-N, or from outside of any electronic mail system from at least one additional processor 312 which is connected directly to interface switch 304 to originate information to be transmitted to a destination processor A-N in an electronic mail system as described below. The RF information transmission network 302 transmits the disassembled information from the hub switch 116 including the identification number of the RF receiver 119 transferring information to the destination processor A-N to a local switch 112 storing the file 154 identified by the identification number and any destination 178 of the RF receiver in the RF information transmission network to which the information and identification number is to be transmitted by the RF information transmission network and adds any destination of the RF receiver to the information in accordance with the prior art system described above with reference to FIGS. 2-6. The RF information transmission network in response to any added destination transmits the information and identification number to the destination in accordance with the prior art system described above with reference to FIGS. 2-6 for RF broadcast to the RF receiver 119 for transfer to the destination processor A-N.

The information is transmitted to a receiving interface switch 304 from one or more gateway switches 14 by one or more electronic mail systems 1-N in response to an address of the receiving interface switch which has been added to the information originated by the originating processor by either the originating processor or gateway switch. The information is transmitted from the receiving interface switch 304 to the RF information transmission network with an address of the destination processor, such as a name of a user of the destination processor A-N, to receive the information which has been added by either the originating processor A-N, a gateway switch 14 or the receiving interface switch 304.

Various options exist for the adding of the address of the receiving interface switch and address of the destination processor. Preferably, the address of the receiving interface switch is a word, such as "TF-MOBOX", which is recognized throughout the electronic mail system when appended to information as directing the information to be transmitted to the interface switch 304. The address of the destination processor is preferably the identification number of the RF receiver 119 within the RF information transmission network 302. The address of the receiving interface switch may be added to the information originated by the originating processor, by a gateway switch 14 or by the originating processor A-N. The address of the receiving interface switch 304 may be added to the information by matching an identification of the destination processor A-N which may be the name of the individual utilizing the processor or some other information and adds an address of an interface switch such as the aforementioned "TF-MOBOX" stored with the matched identification of the destination processor to the information as the address of the receiving interface switch. Alternatively, the originating processor may be used to add the address of the receiving interface switch 14 by an inputting of the address of the receiving interface switch (TF-MOBOX) along with an identification of the destination processor A-N (name of recipient using the processor). The originating processor A-N may also add the address of the receiving interface switch 304 by matching an identification of the destination processor (name of the user of the processor) with a stored identification of a destination processor and adding an address of the interface switch (TF-MOBOX) stored with the matched identification of the destination processor to the information as the address of the receiving interface switch. The identification number may be added to the information originated by the originating processor or, alternatively, maybe added by the originating processor by matching an identification of the destination processor (the name of the user of the processor) with a stored identification of a destination processor (the authorized user of the destination processor) and adding an identification number stored with the matched identification of the destination processor to the information as the identification number of the RF receiver 119. Alternatively, the aforementioned matching process may be performed by either the gateway switch 14 or the interface switch 304.

The at least one additional processor 312. originates information from outside of any electronic mail system. The processors 312 provide an address of at least one destination processor in an electronic mail system, such as the name of the user, to receive information transmitted by the RF information transmission system 302 or an identification number of the RF receiver 119 receiving information and transferring the information to the destination processor. The interface switch 304 which receives the information from each processor 312 adds information used by the RF information transmission network 302 during transmission of the information to the RF receiver 119 receiving the information in the same manner as described above with respect to the interface switch 304.

The advantage of connecting the processors 312 directly to the interface switch 304 is that the processors 312 are only required to have a telephone modem and support programming to format information for RF transmission to a destination processor A-N within any one of one or more electronic mail systems 1-N. The processors 312 are not required to have the necessary electronic mail system software present in originating processors A-N or interconnections with an electronic mail system. As a result of the connection to the interface switch 304, information originating from the additional processors 312 may be transmitted by RF transmission to a destination processor A-N within any one or a plurality of electronic mail systems with the user of the processor 312 or the processor 312 or the interface switch 304 only having to supply an identification number of the receiver 119 to input information into the RF information transmission system 302 for RF transmission to a destination processor.

The difference between originating information by one of the additional processors 312 outside of any electronic mail system and originating information by one of the processors within one of the electronic mail systems is that the direct connection of the additional processor to the interface switch 304 eliminates the requirement for the adding of an address of the interface switch 304 which is required by the electronic mail systems to forward the information to the interface switch where necessary formatting of the information to be compatible with the RF information transmission system is performed. The interface switch 304 packetizes information originating from the additional processors 312 in the same manner as described above with respect to information originating from within an electronic mail system. Information from within an electronic mail system and originating from additional processors 312 outside of the electronic mail system may be formatted into the same packets which are forwarded to the hub switch 116. Additionally, an interface switch 304 may be connected only to the additional processors 312 to provide an interface only for processors outside of any electronic mail system to destination processors A-N within one or more electronic mail systems 1-N. The only information which is necessary to be inputted by the additional processors 312 is the address of the destination processor (user of the processor). The addition of the identification number of the receiver 119 may be added by matching of an identification of the destination processor with stored destination processors within the additional processor 312 or the interface switch 304 with an identification number of the receiver 119 stored with an identification of a destination processor A-N used as an identification of the destination processor upon a match having been made.

FIG. 11 summarizes electronic mail message entry methods for messages (information) originating from originating processors within an electronic mail system. The first entry method adds the address of the interface switch 304 and the destination processor preferably in the form of a user's name; the gateway switch 14 takes no action; and the interface switch 304 adds the identification number of the RF receiver 119. The second entry method adds the address of the interface switch 304 and the identification number of the receiver 119; the gateway switch 14 takes no action; and the interface switch 304 performs only the function of verifying that the identification number which was added by the originating processor is a valid identification number within the RF information transmission network 302. In the third method, the originating processor adds the destination processor preferably in the form of the user's name; the gateway switch adds the destination of the interface switch 304; and the interface switch 304 adds the identification of the receiver 119. In the fourth method, the originating processor adds the destination processor preferably in the form of the user's name only; the gateway switch 14 adds an address of the interface switch 304 and the identification number of the receiver 119; and the interface switch takes no action other than verification that the identification number of the receiver 119 added by the gateway switch 14 is valid. In the fifth method, the operator of the originating processor adds the destination processor, points to an icon displayed on a CRT associated with the originating processor and the originating processor adds the address of the interface switch 304; the gateway switch 14 adds the identification number of the receiver 119 and the interface switch 304 takes no action other than verification. In the sixth method, the operator of the originating processor adds the destination processor, the user of the originating processor points to an icon displayed by a CRT associated with the originating processor which causes the addition of the address of the interface switch 304; the gateway switch takes no action and the interface switch 304 adds the identification of the receiver 119. In the seventh method, the operator of the originating processor adds the destination processor, the user points to an icon displayed on a CRT associated with the originating processor causing the addition of the address of the interface switch 304 and the receiver identification number by comparing an identification of the destination processor, such as user name of the destination processor, to an identification of destination processors with identification numbers or RF receivers 119 which transfer information to the destination processor; the gateway switch 14 takes no action; and the interface switch 304 takes no action.

FIG. 12 illustrates a block diagram of an interface switch 304 in accordance with the present invention. The interface switch 304 has a main CPU 400 to which is connected a floppy drive 402 and a hard drive 404 for providing memory storage for use by the CPU in executing the various functions of the interface switch as described above. The program on pages 10-12 of the Appendix implements the function of the interfaced switch 304 in a 3B2 computer which interfaces with the Telefind Corporation data transmission network described in the above-referenced patents and the AT&T Corporation electronic mail system. A diagnostic and maintenance port 406 is connected to the CPU in accordance with standard practice. A main bus 408 is coupled to a plurality of serial ports 410 which are connected in series with a multispeed modem 412 which is connected to one of the additional processors 312 as discussed above with reference to FIG. 9, to at least one gateway switch with mailboxes 14 in at least one electronic mail system and to a plurality of network ports which are connected to a plurality of X.25 modems 414 which are connected in series with a network port 416 which is connected to hub switch 116 of FIG. 9. A module bay controller 418 controls the bus 408 in accordance with standard practice. Alternatively, if the interface switch is not connected to a gateway switch with mailboxes 14, the interface switch functions only as a general purpose collector switch for the additional processors 312.

While the invention has been described in terms of its preferred embodiments, it should be understood that numerous modifications may be made thereto without departing from the spirit and scope as defined in the appended claims. For example, while the invention has been described in terms of utilizing a preferred RF information transmission network, it should be understood that the invention is equally applicable to other forms of RF transmission systems for broadcasting information originating from an originating processor within an electronic mail system or from an additional processor outside of any electronic mail system to a destination processor connected to an electronic mail system. It is intended that all such modifications fall within the scope of the appended claims. 

What is claimed is:
 1. In a system comprising a communication system which transmits electronic mail, inputted to the communication system from a plurality of processors, and a RF system having a plurality of RF receivers which receive broadcasts from at least one broadcast location, the broadcast including information contained within the electronic mail and an identification of each RF receiver to receive the broadcast, an interface comprising:at least one input which receives at least the information contained within the electronic mail; at least one output which outputs a processed output, the processed output including the information contained within the electronic mail and an identification of each RF receiver which is to receive the broadcast of the information; and a processor, coupled to the at least one input and to the at least one output, which processes at least the information contained within the electronic mail to produce the processed output outputted by the at least one output.
 2. An interface in accordance with claim 1 wherein:the system comprises another communication system which transmits other information to be transmitted to the RF receivers; the at least one input receives the other information from the another communication system; and the at least one output outputs the processed output which contains the other information and an identification of each RF receiver which is to receive broadcasts from the at least one broadcast location including the other information and the identification of each RF receiver to receive the broadcasts.
 3. An interface in accordance with claim 2 wherein:the processing adds the identification of each RF receiver which is to receive the broadcasts of the information in producing the processed output containing the identification of each RF receiver and the information; and the processing adds the identification of each RF receiver which is to receive the broadcasts of the other information in producing the processed output containing the identification of each RF receiver and the other information.
 4. An interface in accordance with claim 2 wherein:the at least one input receives electronic mail addressed to the interface including the identification of each RF receiver and the information to be broadcast to each RF receiver; and the at least one input receives information transmissions containing the identification of each RF receiver and the other information to be broadcast to each RF receiver.
 5. An interface in accordance with claim 2 wherein:the processing processes at least the information contained in the electronic mail to produce the processed output.
 6. An interface in accordance with claim 5 wherein:the processing deletes information from the electronic mail with the processed output not containing the deleted information.
 7. An interface in accordance with claim 6 wherein:the processing deletes a header from the electronic mail with the processed output not containing the deleted header.
 8. An interface in accordance with claim 5 wherein:the processing adds additional information to the information contained in the electronic mail and the identification of each RF receiver to receive information contained in electronic mail with the processed output containing the added information.
 9. An interface in accordance with claim 8 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 10. An interface in accordance with claim 9 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system to where broadcast occurs.
 11. An interface in accordance with claim 10 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted by the RF system.
 12. An interface in accordance with claim 2 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for transmission and broadcast by the RF system.
 13. An interface in accordance with claim 12 wherein:the security check is performed by a comparison of an identification of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of the receiver which is to receive the information matches one of the RF receivers in the RF system.
 14. An interface in accordance with claim 1 wherein:the system comprises a plurality of communication systems and the RF system; the at least one input receives at least the information contained in the electronic mail from the plurality of communication systems; the processed output comprises the information received from the plurality of communication systems and an identification of each RF receiver to receive the broadcasts; and the processor processes at least the information received by the at least one input from the plurality of communication systems to produce the processed output.
 15. An interface in accordance with claim 14 wherein:the processing adds the identification of each RF receiver which is to receive the broadcasts in producing the processed output.
 16. An interface in accordance with claim 14 wherein:the at least one input receives electronic mail addressed to the interface including the identification of each RF receiver and the information to be broadcast to each RF receiver.
 17. An interface in accordance with claim 14 wherein:the processing processes at least the information contained in the electronic mail to produce the processed output.
 18. An interface in accordance with claim 17 wherein:the processing deletes information from the electronic mail with the processed output not containing the deleted information.
 19. An interface in accordance with claim 18 wherein:the processing deletes a header from the electronic mail with the processed output not containing the deleted header.
 20. An interface in accordance with claim 17 wherein:the processing adds additional information to the information contained in the electronic mail and the identification of each RF receiver to receive information contained in electronic mail with the processed output containing the added information.
 21. An interface in accordance with claim 20 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 22. An interface in accordance with claim 21 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system to where the broadcast occurs.
 23. An interface in accordance with claim 22 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted by the RF system.
 24. An interface in accordance with claim 14 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for Transmission and broadcast by the RF system.
 25. An interface in accordance with claim 24 wherein:the security check is performed by a comparison of an identification of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification number of the receiver which is to receive the information matches one of the RF receivers in the RF system.
 26. An interface in accordance with claim 1 wherein:the system comprises a plurality of communication systems and a plurality of RF systems each containing a plurality of RF receivers; the at least one input receives at least the information contained in the electronic mail from the plurality of communication systems; the processed output comprises the information and an identification of each RF receiver to receive the broadcasts; and the processor processes at least the information received by the at least one input to produce the processed output.
 27. An interface in accordance with claim 26 wherein:the processing adds the identification of each RF receiver which is to receive the broadcasts in producing the processed output.
 28. An interface in accordance with claim 26 wherein:the at least one input receives electronic mail addressed to the interface including the identification of each RF receiver and the information to be broadcast to each RF receiver.
 29. An interface in accordance with claim 26 wherein:the processing processes at least the information contained in the electronic mail to produce the processed output.
 30. An interface in accordance with claim 29 wherein:the processing deletes information from the electronic mail with the processed output not containing the deleted information.
 31. An interface in accordance with claim 30 wherein:the processing deletes a header from the electronic mail with the processed output not containing the deleted header.
 32. An interface in accordance with claim 29 wherein:the processing adds additional information to the information contained in the electronic mail and the identification of each RF receiver to receive information contained in electronic mail with the processed output containing the added information.
 33. An interface in accordance with claim 32 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 34. An interface in accordance with claim 33 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 35. An interface in accordance with claim 34 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted by the RF system.
 36. An interface in accordance with claim 26 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for transmission and broadcast by the RF system.
 37. An interface in accordance with claim 36 wherein:the security check is performed by a comparison of an identification of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of the receiver which is to receive the information matches one of the RF receivers in the RF system.
 38. An interface in accordance with claim 1 wherein:the processing adds the identification of each RF receiver which is to receive the broadcasts to produce the processed output.
 39. An interface in accordance with claim 38 wherein:the processing processes at least the information contained in the electronic mail to produce the processed output.
 40. An interface in accordance with claim 39 wherein:the processing deletes information from the electronic mail with the processed output not containing the deleted information.
 41. An interface in accordance with claim 40 wherein:the processing deletes a header from the electronic mail with the processed output not containing the deleted header.
 42. An interface in accordance with claim 39 wherein:the processing adds additional information to the information contained in the electronic mail and the identification of each RF receiver to receive information contained in electronic mail with the processed output containing the added information.
 43. An interface in accordance with claim 42 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 44. An interface in accordance with claim 43 wherein:the added information comprises a packet containing a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 45. An interface in accordance with claim 44 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted by the RF system.
 46. An interface in accordance with claim 38 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for transmission and broadcast by the RF system.
 47. An interface in accordance with claim 46 wherein:the security check is performed by a comparison of an identification of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of the receiver which is to receive the information matches one of the RF receivers in the RF system.
 48. An interface in accordance with claim 1 wherein:the at least one input receives electronic mail addressed to the interface including the identification of each RF receiver which is to receive the broadcasts of the information and the information to be broadcast to each RF receiver.
 49. An interface in accordance with claim 48 wherein:the processing processes at least the information contained in the electronic mail to produce the processed output.
 50. An interface in accordance with claim 49 wherein:the processing deletes information from the electronic mail with the processed output not containing the deleted information.
 51. An interface in accordance with claim 50 wherein:the processing deletes a header from the electronic mail with the processed output not containing the deleted header.
 52. An interface in accordance with claim 49 wherein:the processing adds additional information to the information contained in the electronic mail and the identification of each RF receiver to receive information contained in electronic mail with the processed output containing the added information.
 53. An interface in accordance with claim 52 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 54. An interface in accordance with claim 53 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system where broadcast occurs.
 55. An interface in accordance with claim 54 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted by the RF system.
 56. An interface in accordance with claim 48 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for transmission and broadcast by the RF system.
 57. An interface in accordance with claim 56 wherein:the security check is performed by a comparison of an identification of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification number of the receiver which is to receive the information matches one of the RF receivers in the RF system.
 58. An interface in accordance with claim 1 wherein:the processing processes at least the information contained in the electronic mail to produce the processed output.
 59. An interface in accordance with claim 58 wherein:the processing deletes information from the electronic mail with the processed output not containing the deleted information.
 60. An interface in accordance with claim 59 wherein:the processing deletes a header from the electronic mail with the processed output not containing the deleted header.
 61. An interface in accordance with claim 59 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for transmission and broadcast by the RF system.
 62. An interface in accordance with claim 61 wherein:the security check is performed by a comparison of an identification of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification number of the receiver which is to receive the information matches one of the RF receivers in the RF system.
 63. An interface in accordance with claim 60 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for transmission and broadcast by the RF system.
 64. An interface in accordance with claim 63 wherein:the security check is performed by a comparison of an identification of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of the receiver which is to receive the information matches one of the RF receiver in the RF system.
 65. An interface in accordance with claim 58 wherein:the processing adds additional information to the information contained in the electronic mail and the identification of each RF receiver to receive information contained in electronic mail with the processed output containing the added information.
 66. An interface in accordance with claim 65 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 67. An interface in accordance with claim 66 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system to where broadcast occurs.
 68. An interface in accordance with claim 67 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted by the RF system.
 69. An interface in accordance with claim 65 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for transmission and broadcast by the RF system.
 70. An interface in accordance with claim 69 wherein:the security check is performed by a comparison of an identification of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of the receiver which is to receive the information matches one of the RF receivers in the RF system.
 71. An interface in accordance with claim 66 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for transmission and broadcast by the RF system.
 72. An interface in accordance with claim 71 wherein:the security check is performed by a comparison of an identification of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of the receiver which is to receive the information matches one of the RF receiver in the RF system.
 73. An interface in accordance with claim 67 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for transmission and broadcast by the RF system.
 74. An interface in accordance with claim 73 wherein:the security check is performed by a comparison of an identification of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of the receiver which is to receive the information matches one of the RF receivers in the RF system.
 75. An interface in accordance with claim 68 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for transmission and broadcast by the RF system.
 76. An interface in accordance with claim 75 wherein:the security check is performed by a comparison of an identification number of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of the receiver which is to receive the information matches one of the RF receiver in the RF system.
 77. An interface in accordance with claim 58 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for transmission and broadcast by the RF system.
 78. An interface in accordance with claim 77 wherein:the security check is performed by a comparison of an identification of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of the receiver which is to receive the information matches one of the RF receiver in the RF system.
 79. An interface in accordance with claim 1 wherein:the processor controls performing of a security check on at least the information which is received by the at least one input to determine if at least the information contained in the electronic mail should be outputted by the at least one output for transmission and broadcast by the RF system.
 80. An interface in accordance with claim 79 wherein:the security check is performed by a comparison of an identification of the receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of the receiver which is to receive the information matches one of the RF receivers in the RF system.
 81. In a system comprising at least one communication system which transmits electronic mail containing information inputted from a plurality of processors connected to the at least one communication system, a RF system with the RF system having a plurality of receivers and at least one interface connecting the at least one communication system to the RF system with the information contained in the electronic mail being transmitted to one of the at least one interface and from the one interface through the RF system to least one of the plurality of RF receivers which receives broadcasts from the RF system containing the information contained in the electronic mail and an identification of the at least one of the plurality of RF receivers which receives the broadcasts, a method comprising:combining the identification of each RF receiver to receive a broadcast of the information and the information to be broadcast to each identified RF receiver; and transmitting at least the combined identification of each RF receiver to receive a broadcast of the information and the information to the one interface.
 82. A method in accordance with claim 81 wherein:the combining of the identification of each RF receiver to receive a broadcast of the information and the information to be broadcast to each identified RF receiver occurs at one of the plurality of processors.
 83. A method in accordance with claim 82 wherein:the one interface contains a processor; and the processor processes at least the combined identification of a RF receiver and the information to be broadcast to the identified RF receiver and deletes information therefrom with the processed output not containing the deleted information.
 84. A method in accordance with claim 83 wherein:the processing deletes a header from the electronic mail with the processed output not containing the deleted header.
 85. A method in accordance with claim 83 wherein:the processing also adds additional information to the combined identification of the RF receiver and information to be broadcast to the RF receiver with the processed output containing the added information.
 86. A method in accordance with claim 84 wherein:the processing also adds additional information to the combined identification of the RF receiver and information to be broadcast to the RF receiver with the processed output containing the added information.
 87. A method in accordance with claim 85 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 88. A method in accordance with claim 86 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 89. A method in accordance with claim 87 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 90. A method in accordance with claim 88 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 91. A method in accordance with claim 89 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted by the RF system.
 92. A method in accordance with claim 90 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted in the RF system.
 93. A method in accordance with claim 82 wherein:the one interface contains a processor; and the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 94. A method in accordance with claim 93 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 95. A method in accordance with claim 83 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 96. A method in accordance with claim 95 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 97. A method in accordance with claim 84 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 98. A method in accordance with claim 97 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 99. A method in accordance with claim 85 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 100. A method in accordance with claim 99 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 101. A method in accordance with claim 86 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 102. A method in accordance with claim 101 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 103. A method in accordance with claim 87 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 104. A method in accordance with claim 103 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 105. A method in accordance with claim 88 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 106. A method in accordance with claim 105 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 107. A method in accordance with claim 89 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 108. A method in accordance with claim 107 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 109. A method in accordance with claim 90 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 110. A method in accordance with claim 109 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 111. A method in accordance with claim 91 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 112. A method in accordance with claim 111 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 113. A method in accordance with claim 92 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 114. A method in accordance with claim 113 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 115. A method in accordance with claim 81 wherein:the combining of the identification of each RF receiver to receive a broadcast of the information and the information to be broadcast to the identified RF receiver occurs in one of the at least one communication system.
 116. A method in accordance with claim 115 wherein:the combining occurs in an electronic mail system.
 117. A method in accordance with claim 116 wherein:the one interface contains a processor; and the processor processes at least the combined identification of a RF receiver and the information to be broadcast to the identified RF receiver and deletes information therefrom with the processed output not containing the deleted information.
 118. A method in accordance with claim 117 wherein:the processing deletes a header from the electronic mail with the processed output not containing the deleted header.
 119. A method in accordance with claim 117 wherein:the processing also adds additional information to the combined identification of the RF receiver and information to be broadcast to the RF receiver with the processed output containing the added information.
 120. A method in accordance with claim 118 wherein:the processing also adds additional information to the combined identification of the RF receiver and information to be broadcast to the RF receiver with the processed output containing the added information.
 121. A method in accordance with claim 119 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 122. A method in accordance with claim 120 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 123. A method in accordance with claim 121 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 124. A method in accordance with claim 122 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 125. A method in accordance with claim 123 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted in the RF system.
 126. A method in accordance with claim 124, wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted in the RF system.
 127. A method in accordance with claim 115 wherein:the one interface contains a processor; and the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 128. A method in accordance with claim 127 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 129. A method in accordance with claim 116 wherein:the one interface contains a processor; and the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 130. A method in accordance with claim 129 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 131. A method in accordance with claim 117 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 132. A method in accordance with claim 131 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 133. A method in accordance with claim 118 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 134. A method in accordance with claim 133 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 135. A method in accordance with claim 119 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 136. A method in accordance with claim 135 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 137. A method in accordance with claim 120 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 138. A method in accordance with claim 137 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 139. A method in accordance with claim 121 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 140. A method in accordance with claim 139 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 141. A method in accordance with claim 122 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 142. A method in accordance with claim 141 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 143. A method in accordance with claim 123 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 144. A method in accordance with claim 143 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 145. A method in accordance with claim 124 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 146. A method in accordance with claim 145 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 147. A method in accordance with claim 125 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 148. A method in accordance with claim 147 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 149. A method in accordance with claim 126 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 150. A method in accordance with claim 149 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 151. A method in accordance with claim 115 wherein:the one interface contains a processor; and the processor processes at least the combined identification of a RF receiver and the information to be broadcast to the identified RF receiver and deletes information therefrom with the processed output not containing the deleted information.
 152. A method in accordance with claim 151 wherein:the processing deletes a header from the electronic mail with the processed output not containing the deleted header.
 153. A method in accordance with claim 151 wherein:the processing also adds additional information to the combined identification of the RF receiver and information to be broadcast to the RF receiver with the processed output containing the added information.
 154. A method in accordance with claim 152 wherein:the processing also adds additional information to the combined identification of the RF receiver and information to be broadcast to the RF receiver with the processed output containing the added information.
 155. A method in accordance with claim 153 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 156. A method in accordance with claim 154 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 157. A method in accordance with claim 155 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 158. A method in accordance with claim 156 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 159. A method in accordance with claim 157 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted by the RF system.
 160. A method in accordance with claim 158 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted in the RF system.
 161. A method in accordance with claim 151 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 162. A method in accordance with claim 161 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 163. A method in accordance with claim 152 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 164. A method in accordance with claim 163 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 165. A method in accordance with claim 153 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 166. A method in accordance with claim 165 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 167. A method in accordance with claim 154 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 168. A method in accordance with claim 167 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 169. A method in accordance with claim 155 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 170. A method in accordance with claim 169 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 171. A method in accordance with claim 156 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 172. A method in accordance with claim 171 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 173. A method in accordance with claim 157 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 174. A method in accordance with claim 173 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 175. A method in accordance with claim 158 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 176. A method in accordance with claim 175 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 177. A method in accordance with claim 159 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 178. A method in accordance with claim 177 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 179. A method in accordance with claim 160 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 180. A method in accordance with claim 179 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 181. A method in accordance with claim 81 wherein:the one interface contains a processor; and the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 182. A method in accordance with claim 181 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of each identification of the receiver which is to receive the information matches one of the RF receivers in the RF system.
 183. A method in accordance with claim 81 wherein:the combining occurs at the one interface.
 184. A method in accordance with claim 183 wherein:the one interface contains a processor; and the processor processes at least the combined identification of a RF receiver and the information to be broadcast to the identified RF receiver and deletes information therefrom with the processed output not containing the deleted information.
 185. A method in accordance with claim 184 wherein:the processing deletes a header from the electronic mail with the processed output not containing the deleted header.
 186. A method in accordance with claim 184 wherein:the processing also adds additional information to the combined identification of the RF receiver and information to be broadcast to the RF receiver with the processed output containing the added information.
 187. A method in accordance with claim 185 wherein:the processing also adds additional information to the combined identification of the RF receiver and information to be broadcast to the RF receiver with the processed output containing the added information.
 188. A method in accordance with claim 186 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 189. A method in accordance with claim 187 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 190. A method in accordance with claim 188 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 191. A method in accordance with claim 189 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 192. A method in accordance with claim 190 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted in the RF system.
 193. A method in accordance with claim 191 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted in the RF system.
 194. A method in accordance with claim 183 wherein:the one interface contains a processor; and the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 195. A method in accordance with claim 194 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 196. A method in accordance with claim 184 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 197. A method in accordance with claim 196 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 198. A method in accordance with claim 185 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 199. A method in accordance with claim 198 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 200. A method in accordance with claim 186 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 201. A method in accordance with claim 200 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 202. A method in accordance with claim 187 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 203. A method in accordance with claim 202 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 204. A method in accordance with claim 188 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 205. A method in accordance with claim 204 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 206. A method in accordance with claim 189 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 207. A method in accordance with claim 206 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 208. A method in accordance with claim 190 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 209. A method in accordance with claim 208 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 210. A method in accordance with claim 208 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 211. A method in accordance with claim 210 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 212. A method in accordance with claim 191 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 213. A method in accordance with claim 212 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 214. A method in accordance with claim 192 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 215. A method in accordance with claim 214 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 216. A method in accordance with claim 193 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 217. A method in accordance with claim 216 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 218. A method in accordance with claim 81 wherein:the one interface contains a processor; and the processor processes at least the combined identification of a RF receiver and the information to be broadcast to the identified RF receiver and deletes information therefrom with the processed output not containing the deleted information.
 219. A method in accordance with claim 218 wherein:the processing deletes a header from the electronic mail with the processed output not containing the deleted header.
 220. A method in accordance with claim 218 wherein:the processing also adds additional information to the combined identification of the RF receiver and information to be broadcast to the RF receiver with the processed output containing the added information.
 221. A method in accordance with claim 219 wherein:the processing also adds additional information to the combined identification of the RF receiver and information to be broadcast to the RF receiver with the processed output containing the added information.
 222. A method in accordance with claim 220 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 223. A method in accordance with claim 221 wherein:the added information is a destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 224. A method in accordance with claim 222 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 225. A method in accordance with claim 223 wherein:the added information comprises a packet containing the destination to which the processed output is transmitted within the RF system where the broadcast occurs.
 226. A method in accordance with claim 224 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted by the RF system.
 227. A method in accordance with claim 225 wherein:the packet also contains a destination of a switch in the RF system to which at least part of the packet is transmitted in the RF system.
 228. A method in accordance with claim 218 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 229. A method in accordance with claim 228 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 230. A method in accordance with claim 219 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 231. A method in accordance with claim 230 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 232. A method in accordance with claim 220 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 233. A method in accordance with claim 232 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 234. A method in accordance with claim 221 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 235. A method in accordance with claim 234 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 236. A method in accordance with claim 222 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 237. A method in accordance with claim 236 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 238. A method in accordance with claim 223 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 239. A method in accordance with claim 238 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 240. A method in accordance with claim 224 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 241. A method in accordance with claim 240 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 242. A method in accordance with claim 226 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 243. A method in accordance with claim 242 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 244. A method in accordance with claim 227 wherein:the processor performs a security check to determine if the combined identification of each RF receiver to receive the broadcast of the information and the information should be outputted from the one interface to the RF system.
 245. A method in accordance with claim 244 wherein:the security check is performed by a comparison of an identification of each receiver, which is to receive the information, with actual identifications of RF receivers in the RF system with the processor permitting the processed output when a match of the identification of each receiver which is to receive the information matches one of the RF receivers in the RF system.
 246. In a system comprising a communication system which transmits electronic mail containing information, with the electronic mail being inputted to the communication system from a plurality of processors, a RF system and an interface connecting the communication system to the RF system with the information contained in the electronic mail and an identification of a RF device in the RF system being transmitted from the interface to the RF system and broadcast by the RF system to an identified RF device, the identified RF device comprising:a RF receiver, which receives the information when the identification of the device is detected in a broadcast by the RF system to the RF receiver; and a memory, coupled to the RF receiver, which stores the information received by the RF receiver contained in the electronic mail inputted to the communication system.
 247. The RF device in accordance with claim 246 further comprising:a processor, coupled to the memory, which after the information has been outputted from the memory, processes the information.
 248. The RF device in accordance with claim 247 further comprising:at least one application program, executed by the processor, which processes the information.
 249. The RF device in accordance with claim 246 further comprising:a display which displays the information.
 250. A method of transmitting information contained in electronic mail with a communication system and a RF system with the RF system broadcasting the information to a RF receiver with the RF system being connected to the communication system by at least one interface comprising:inputting electronic mail from a processor to the communication system with the electronic mail including at least the information to be broadcast to the RF receiver; receiving with one of the at least one interface at least the information to be broadcast to the RF receiver; transmitting a processed output including at least the information and an identification of the RF receiver to receive the information from the one interface to a broadcast location in the RF system; broadcasting the information and the identification of the RF receiver with the RF system from the broadcast location; and receiving the broadcast information and the identification of the RF receiver with the RF receiver.
 251. A method in accordance with claim 250 wherein:the electronic mail inputted by the processor to the communication system comprises the information, the identification of the RF receiver and an address of the one interface; and the communication system transmits the electronic mail to the one interface.
 252. A method in accordance with claim 251 wherein:the one interface comprises a processor; and the processor processes information received by the one interface and deletes information from the received information with the processed output not containing the deleted information.
 253. A method in accordance with claim 252 wherein:the processing deletes a header from information received by the one interface with the processed output not containing the deleted header.
 254. A method in accordance with claim 252 wherein:the processor also adds additional information to the information received by the one interface with the processed output containing the added information.
 255. A method in accordance with claim 253 wherein:the processor also adds additional information to the information received by the one interface with the processed output containing the added information.
 256. A method in accordance with claim 254 wherein:the added information is a packet.
 257. A method in accordance with claim 256 wherein:at least part of the packet is transmitted by the RF system and broadcast to the RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 258. A method in accordance with claim 255 wherein:the added information is a packet.
 259. A method in accordance with claim 258 wherein:at least part of the packet is transmitted by the RF system and broadcast to the RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 260. A method in accordance with claim 259 wherein:at least part of the packet is transmitted by the RF system and broadcast to the RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 261. A method in accordance with claim 251 wherein:the one interface comprises a processor; and the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 262. A method in accordance with claim 252 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 263. A method in accordance with claim 253 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 264. A method in accordance with claim 254 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 265. A method in accordance with claim 255 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 266. A method in accordance with claim 256 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 267. A method in accordance with claim 257 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 268. A method in accordance with claim 258 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 269. A method in accordance with claim 259 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 270. A method in accordance with claim 260 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 271. A method in accordance with claim 251 further comprising:storing the information received by the RF receiver in a memory; and processing the information stored in the memory with an application program executed by a processor coupled to the RF memory.
 272. A method in accordance with claim 250 wherein:the communication system combines the information and the identification of RF receiver and transmits the combined information and the identification of the RF receiver to the one interface.
 273. A method in accordance with claim 272 wherein:the one interface comprises a processor; and the processor processes information received by the one interface and deletes information from the received information with the processed output not containing the deleted information.
 274. A method in accordance with claim 273 wherein:the processing deletes a header from information received by the one interface with the processed output not containing the deleted header.
 275. A method in accordance with claim 273 wherein:the processor also adds additional information to the information received by the one interface with the processed output containing the added information.
 276. A method in accordance with claim 274 wherein:the processor also adds additional information to the information received by the one interface with the processed output containing the added information.
 277. A method in accordance with claim 275 wherein:the added information is a packet.
 278. A method in accordance with claim 277 wherein:at least part of the packet is transmitted by the RF system and broadcast to the RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 279. A method in accordance with claim 276 wherein:the added information is a packet.
 280. A method in accordance with claim 272 wherein:the one interface comprises a processor; and the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 281. A method in accordance with claim 273 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 282. A method in accordance with claim 274 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 283. A method in accordance with claim 275 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 284. A method in accordance with claim 276 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 285. A method in accordance with claim 277 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 286. A method in accordance with claim 278 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 287. A method in accordance with claim 279 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 288. A method in accordance with claim 272 further comprising:storing the information received by the RF receiver in a memory; and processing the information stored in the memory with an application program executed by a processor coupled to the RF memory.
 289. A method in accordance with claim 250 wherein:the one interface comprises a processor; and the processor processes information received by the one interface and deletes information from the received information with the processed output not containing the deleted information.
 290. A method in accordance with claim 289 wherein:the processing deletes a header from information received by the one interface with the processed output not containing the deleted header.
 291. A method in accordance with claim 289 wherein:the processor also adds additional information to the information received by the one interface with the processed output containing the added information.
 292. A method in accordance with claim 290 wherein:the processor also adds additional information to the information received by the one interface with the processed output containing the added information.
 293. A method in accordance with claim 291 wherein:the added information is a packet.
 294. A method in accordance with claim 293 wherein:at least part of the packet is transmitted by the RF system and broadcast to the RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 295. A method in accordance with claim 292 wherein:the added information is a packet.
 296. A method in accordance with claim 295 wherein:at least part of the packet is transmitted by the RF system and broadcast to the RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 297. A method in accordance with claim 289 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 298. A method in accordance with claim 290 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 299. A method in accordance with claim 291 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 300. A method in accordance with claim 292 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 301. A method in accordance with claim 293 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 302. A method in accordance with claim 294 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 303. A method in accordance with claim 395 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 304. A method in accordance with claim 296 wherein:the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 305. A method in accordance with claim 290 further comprising:storing the information received by the RF receiver in a memory; and processing the information stored in the memory with an application program executed by a processor coupled to the RF memory.
 306. A method in accordance with claim 291 further comprising:storing the information received by the RF receiver in a memory; and processing the information stored in the memory with an application program executed by a processor coupled to the RF memory.
 307. A method in accordance with claim 297 further comprising:storing the information received by the RF receiver in a memory; and processing the information stored in the memory with an application program executed by a processor coupled to the RF memory.
 308. A method in accordance with claim 250 wherein:the one interface comprises a processor; and the processor processes the information received by the one interface and performs a security check on information received by the one interface by performing a comparison of the identification of the RF receiver with permissible identifications of RF receivers in the RF system with the processor providing a processed output when a match of the identification of the RF receiver to receive the information matches one of the RF receivers in the RF system.
 309. A method in accordance with claim 308 further comprising:storing the information received by the RF receiver in a memory; and processing the information stored in the memory with an application program executed by a processor coupled to the RF memory.
 310. A method in accordance with claim 250 further comprising:storing the information received by the RF receiver in a memory; and processing the information stored in the memory with an application program executed by a processor coupled to the RF memory.
 311. A method of transmitting and distributing inputted information through a distributed system, comprising:originating electronic mail from a processor in a communication system which electronic mail includes (a) an address of an interface which connects the communication system to a RF system to which the electronic mail is delivered by the communication system in response to the address in the electronic mail, (b) an identification of a RF receiver in the RF system to receive the inputted information, and (c) the inputted information to be delivered to the RF receiver; receiving the originated electronic mail at the interface which connects the communication system to the RF system; adding information to the inputted information and the identification of the at least one designated RF receiver to facilitate transmission of the inputted information and the identification to the RF receiver; broadcasting the inputted information and the identification of the RF receiver from at least one broadcast location to the RF receiver; receiving the broadcasted inputted information and the identification of the RF receiver with the RF receiver; and storing the received inputted broadcast information in a memory and processing the information stored in the memory with an application program executed by another processor coupled to the memory.
 312. A method in accordance with claim 311 wherein:a header, added by the processor in the communication system, is deleted from the electronic mail prior to broadcasting of the inputted information and the identification of the RF receiver.
 313. A method in accordance with claim 311 wherein:the identification of the RF receiver is compared with permissible identification numbers in the RF system to determine if the inputted information and the identification of the RF receiver should be transmitted by the RF system to the RF receiver.
 314. A method in accordance with claim 313 wherein:a header, added by the processor in the communication system, is deleted from the electronic mail prior to broadcasting of the inputted information and the identification of the RF receiver to the RF receiver.
 315. A method in accordance with claim 311 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 316. A method in accordance with claim 312 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 317. A method in accordance with claim 313 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 318. A method in accordance with claim 314 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 319. A method of transmitting and distributing inputted information through a communication system and an RF system, comprising:transmitting electronic mail from a processor in the communication system, which electronic mail includes (a) an address in the communication system of an interface to which the electronic mail is delivered by the communication system in response to the address in the electronic mail, (b) an identification of a RF receiver in the RF system to receive the inputted information, and (c) the information to be received by the RF receiver; receiving the transmitted electronic mail at the interface and transmitting at least the inputted information and the identification of the RF receiver to the RF system; broadcasting the inputted information and the identification of the RF receiver with the RF system; receiving the inputted information and the identification of the RF receiver with the RF receiver; and storing the received inputted broadcast information in a memory and processing the information stored in the memory with an application program executed by another processor coupled to the memory.
 320. A method in accordance with claim 319 wherein: a header, added by the processor in the communication system, is deleted from the electronic mail prior to broadcasting of the inputted information and the identification of the RF receiver.
 321. A method in accordance with claim 319 wherein:the identification of the RF receiver is compared with permissible identification numbers in the RF system to determine if the inputted information and the identification of the RF receiver should be transmitted by the RF system to the RF receiver.
 322. A method in accordance with claim 321 wherein:a header, added by the processor in the communication system, is deleted from the electronic mail prior to broadcasting of the inputted information and the identification of the RF receiver to the RF receiver.
 323. A method in accordance with claim 319 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 324. A method in accordance with claim 322 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 325. A method in accordance with claim 323 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 326. In a system for transmitting and distributing inputted information, contained in electronic mail originating at a processor in a communication system, through a RF system which electronic mail includes (a) an address in the communication system to which the electronic mail is delivered by the communication system in response to the address in the communication system, (b) an identification of a RF receiver in the RF system to receive the inputted information and (c) the inputted information to be received by the RF receiver, the method comprising:providing an interface connecting the communication system to the RF system which is the address in the communication system to which electronic mail is delivered by the communication system; processing the electronic mail after being received at the interface from the communication system and transmitting at least the inputted information and the identification of the RF receiver to the RF system; transmitting the identification of the at least one RF receiver and the inputted information to at least one broadcast location in the RF system; broadcasting the inputted information and the identification of the RF receiver from the at least one broadcast location to the RF receiver; and storing the received inputted information in a memory and processing the information stored in the memory with an application program executed by another processor coupled to the memory.
 327. A method in accordance with claim 326 wherein:the identification of the RF receiver to which the inputted information and the identification of the RF receiver is to be broadcasted is verified to determine if the inputted information and the identification of the RF receiver should be transmitted by the RF system to the RF receiver.
 328. A method in accordance with claim 326 wherein:a header is deleted from the electronic mail prior to broadcasting of the inputted information and the identification of the RF receiver to the RF receiver.
 329. A method in accordance with claim 326 wherein:the identification of the RF receiver is compared with permissible identification numbers of RF receivers in the RF system to determine if the inputted information and the identification of the RF receiver should be transmitted by the RF system to the RF receiver.
 330. A method in accordance with claim 326 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 331. A method in accordance with claim 327 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 332. In a system for transmitting and distributing inputted information contained in electronic mail originating from a communication system and transmitted through an interface to a RF system which broadcasts at least the inputted information and an identification of a RF receiver to the RF receiver with the interface being a destination in the communication system to which electronic mail is delivered by the communication system in response to an address of the destination in the electronic mail and at least the inputted information and the identification of the RF receiver are transmitted from the interface to the RF system, are transmitted by the RF system to at least one broadcast location in the RF system and are broadcasted from the at least one broadcast location to the RF receiver, the method comprising:connecting a processor to the communication system; originating the electronic mail at the processor with the electronic mail including (a) the address of the destination to which the electronic mail is delivered by the communication system, (b) the identification of the RF receiver, and (c) the inputted information to be received by the RF receiver; and storing received broadcasted information in a memory and processing the information stored in the memory with an application program executed by another processor coupled to the memory.
 333. A method in accordance with claim 332 wherein:the identification of the RF receiver is compared with permissible identification numbers of RF receivers in the RF system to determine if at least the inputted information and the identification of the RF receiver should be transmitted by the RF system to the RF receiver.
 334. A method in accordance with claim 333 wherein:information is combined with the inputted information which is used by the RF system during transmission of at least the identification of the RF receiver and the inputted information to the at least one broadcast location where at least the inputted information and the identification of the RF receiver are broadcasted to the RF receiver.
 335. A method in accordance with claim 332 wherein:a header is deleted from the electronic mail and then at least the inputted information and the identification of the RF receiver are broadcasted from the at least one broadcast location to the RF receiver.
 336. A method in accordance with claim 335 wherein:information is combined with the inputted information which is used by the RF system during transmission of at least the identification of the RF receiver and the inputted information to the at least one broadcast location where at least the inputted information and the identification of the RF receiver are broadcasted to the RF receiver.
 337. A method in accordance with claim 332 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 338. A method in accordance with claim 333 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 339. A method in accordance with claim 334 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 340. A method in accordance with claim 335 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system.
 341. A method in accordance with claim 336 wherein:the inputted information and the identification of the RF receiver are transmitted by the RF system and broadcast to RF receiver at a location in the RF system which is determined by the RF system processing information stored in the RF system. 