Dial back E-mail system using binary protocol

ABSTRACT

A sender prepares a message, then transmits an e-mail notice to the receiver and the e-mail message to a forwarding server. The “e-mail notice” is a short message, including a message ID and specifically does not include the complete prepared message. The “e-mail message” is in binary format and also includes the message ID of the corresponding e-mail notice. The receiving user receives the e-mail notice, then contacts the forwarding server to receive the e-mail message corresponding to the message ID within the received e-mail notice.

BACKGROUND OF THE INVENTION

[0001] This invention relates to user messaging systems over a globalinformation network, and more particularly to an accelerated electronicmail system implemented over a global information network.

[0002] There are many protocols for routing information over a globalinformation network, such as the internet. E-mail is a widely usedelectronic messaging system. Despite its popularity, the technologiesfor e-mail are old dating back into the 1960's or 1970's. Conventionale-mail uses a standardized protocol known as UUencoding, which inflatesthe size of a file so as to use the ascii character set. Given theincreasing volume of e-mail traffic over the internet, it is desirableto implement a messaging system which is more efficient, such as byusing less bandwidth.

SUMMARY OF THE INVENTION

[0003] According to the invention, an electronic messaging system for aglobal information network, such as the internet, is implemented using abinary protocol. To send a message, one end user (sending user) preparesthe message for another end user (receiving user), then issues a commandto transmit the message. According to one aspect of this invention, inresponse to the transmit command, an e-mail application automaticallyprepares an e-mail notice and forwards the e-mail notice to thereceiving user's destination e-mail address. The e-mail application isrun at the sending user's computer, a gateway computer to which thesender is networked, or the sender's internet service provider.

[0004] For purposes of clarity, the following naming conventions areused herein. “Prepared message” refers to the information prepared bythe end user, such as typed in text, and attached files (e.g., textfiles, graphic files, executable files). The “e-mail notice” means theshort message which includes the message ID and specifically does notinclude the complete prepared message. In some embodiments it doesinclude a subject description prepared by the sending user or anabbreviated form of the prepared message. The “e-mail message” is theprepared message as formatted, and as packaged with header or othertransmission or accounting information. The e-mail message is in binaryformat using a protocol supporting the binary format. In someembodiments the formatting of the prepared message includes beingcompressed. The e-mail message also includes the message ID of thecorresponding e-mail notice.

[0005] According to another aspect of the invention, the sender's e-mailapplication also prepares the e-mail message from the prepared message,then commences transmission of the e-mail message to a forwardingserver.

[0006] According to another aspect of the invention, the receiving userreceives the e-mail notice, such as upon logging onto the globalinformation network. Either automatically or upon instigation by thereceiving user, an e-mail application on behalf of the receiving usercontacts the forwarding server to receive the e-mail messagecorresponding to the message ID within the received e-mail notice.

[0007] According to one advantage of the invention, using a binaryprotocol has the advantage of being very compressible using standardcompression algorithms. According to another advantage of the invention,global information network bandwidth used for electronic messaging isreduced. These and other aspects and advantages of the invention will bebetter understood by reference to the following detailed descriptiontaken in conjunction with the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

[0008]FIG. 1 is a schematic diagram of an exemplary wide area networkhosting the method of this invention;

[0009]FIG. 2 is a block diagram of a computer system for a computerconnected into the network of FIG. 1;

[0010]FIG. 3 is a block diagram of a global information networkmail-messaging system configuration according to an embodiment of thisinvention;

[0011]FIG. 4 is a flow chart and data flow diagram of mail messageprocessing at a source location;

[0012]FIG. 5 is a flow chart and data flow diagram of mail messagingprocessing at a destination location according to one embodiment;

[0013]FIG. 6 is flow chart and data flow diagram of mail messagingprocessing at a forwarding server;

[0014]FIG. 7 is a flow chart of mail messaging processing at adestination location according to another embodiment; and

[0015]FIG. 8 is a flow chart of a mail messaging application at a sourcelocation for responding to a request from the destination location totransmit the mail message.

DESCRIPTION OF SPECIFIC EMBODIMENTS

[0016] Host Network Environment

[0017]FIG. 1 shows a wide area network 10 formed by a plurality ofnetwork server computers 12 which are interlinked. Each network servercomputer 12 stores documents accessible to other network servercomputers 12 and to client computers 14 and networks 16 which link intothe wide area network 10. The configuration of the wide area network 10may change over time as client computers 14 and one or more networks 16connect and disconnect from the network 10. For example, when a clientcomputer 14 and a network 16 are connected with the network serverscomputers 12, the wide area network includes such client computer 14 andnetwork 16. As used herein the term computer includes any device ormachine capable of accepting data, applying prescribed processes to thedata, and supplying results of the processes.

[0018] The wide area network 10 stores information which is accessibleto the network server computers 12, remote networks 16 and clientcomputers 14. The information is accessible as documents. The termdocument as used herein, includes files (as per the Windows operatingsystem usage), documents (as per the MacOS operating system usage),pages (as per the web phraseology usage), and other records, entries orterminology used to describe a unit of a data base, a unit of a filesystem or a unit of another data collection type, whether or not suchunits are related or relational.

[0019] The network server computers 12 are formed by main framecomputers minicomputers, and/or microcomputers having one or moreprocessors each. The server computers 12 are linked together by wiredand/or wireless transfer media, such as conductive wire, fiber opticcable, and/or microwave transmission media, satellite transmission mediaor other conductive, optic or electromagnetic wave transmission media.The client computers 14 access a network server computer 12 by a similarwired or a wireless transfer medium. For example, a client computer 14may link into the wide area network 10 using a modem and the standardtelephone communication network. Alternative carrier systems such ascable and satellite communication systems also may be used to link intothe wide area network 10. Still other private or time-shared carriersystems may be used. In one embodiment the wide area network is a globalinformation network, such as the internet. In another embodiment thewide area network is a private intranet using similar protocols as theinternet, but with added security measures and restricted accesscontrols. In still other embodiments the wide area network is a private,or semi-private network using proprietary communication protocols.

[0020] The client computer 14 is any end user computer, and may also bea mainframe computer, minicomputer or microcomputer having one or moremicroprocessors. The remote network 16 may be a local area network, anetwork added into the wide area network through an independent serviceprovider (ISP) for the internet, or another group of computersinterconnected by wired or wireless transfer media having aconfiguration which is either fixed or changing over time. Clientcomputers 14 may link into and access the wide area network 10independently or through a remote network 16.

[0021] Computer System

[0022] The functions of the present invention preferably are performedby programmed digital computers of the type which are well known in theart, an example of which is shown in FIG. 2. A computer system 20 has adisplay monitor 22, a keyboard 24, a pointing/clicking device 26, aprocessor 28, random access memory (RAM) 30, a non-volatile storagedevice such as a hard disk drive 32, a communication or networkinterface 34 (e.g., modem; ethernet adapter), and a transportablestorage media drive 36 which reads transportable storage media 38. Inaddition other miscellaneous storage devices 40, such as a floppy diskdrive, CD-ROM drive, zip drive, bernoulli drive or other magnetic,optical or other storage media, may be included. The various componentsinterface and exchange data and commands through one or more busses 42.The computer system 20 receives information by entry through thekeyboard 24, pointing/clicking device 26, the network interface 34 oranother input device or input port. The computer system 20 may be any ofthe types well known in the art, such as a mainframe computer,minicomputer, or microcomputer and may serve as a network servercomputer 12, remote network 16 computer or a client computer 14. Thecomputer system 20 may even be configured as a workstation, personalcomputer, network server, or a reduced-feature network terminal device.

[0023] Mail-Messaging System

[0024] Referring to FIG. 3, the network 10 of FIG. 1 is shown as aglobal information network 10′ embodying a mail-messaging system 44,according to an embodiment of this invention. There are three functionallocations involved in the messaging system: a source location 46, adestination location 48 and a forwarding server 50. The source location46 is any computer generating an electronic mail message according tothis invention. The destination 48 is any computer receiving anelectronic mail message according to this invention. In variousexamples, the source location 46 is any end user device having direct orindirect access to the global information network 10′. Exemplary devicesinclude the computer 20 of FIG. 2, a terminal, a cellular telephone.Similarly, the destination location 48 is any end user device havingdirect or indirect access to the global information network 10′.Specific examples of a source or destination location include an enduser computer coupled to an internet service provider, an end usercomputer having a direct connection and end user computer which is partof a network having a gateway to the global information network 10′. Thesource location 46 includes a device having a global information networkaddress used for identifying the source of the mail message, the deviceat which an end user prepares the mail message, and any devices whichformat the message prior to sending the mail message, (e.g., the gatewayor ISP). The destination location 48 includes a device having a globalinformation network address used for identifying the destination of themail message and the device at which an end user requests access to themessage. The forwarding server 50 is a computer system 20 serving as anintermediary in the mail messaging system 44.

[0025] The following terms are used concerning the mail messages.“Prepared message” refers to the information prepared by the end user,such as typed in text, and attached files (e.g., text files, graphicfiles, executable files). It does not refer to any formatting orpackaging. “E-mail notice” refers to a short message which includes themessage ID and specifically does not include the complete preparedmessage. In a preferred embodiment the e-mail notice does not includeany of the prepared message. In some embodiments, however, the e-mailnotice does include a subject description prepared by the sending useror an abbreviated form of the prepared message. The “e-mail message” isthe prepared message as formatted, and as packaged with header or othertransmission or accounting information. The e-mail message is in binaryformat using a protocol supporting the binary format. Binary format isdistinguished from ascii format. Examples of protocols supporting binaryformatting include the file transfer protocol (FTP) and the hypertexttransmission protocol (HTTP). These are distinguished, for example, fromthe UUencoding protocol which is designed to use the ascii format.Binary format has the advantage of being very compressible usingstandard compression algorithms. Accordingly, in some embodiments theformatting of the prepared message includes being compressed.

[0026] Mail-Messaging Method

[0027] Referring to FIG. 4, a sending end user creates a preparedmessage 52 at step 54 using a text editor, word processor or other filecreating application. At step 56, the end user instigates a mailoperation, such as by initiating a send command. In response to suchcommand, a messaging application at step 58 generates the e-mail notice60 and at step 62 generates the e-mail message 64. The messagingapplication is located at the source location 46 (e.g., the end user'scomputer/device, the gateway coupled to the end user's computer/device,or the ISP server to which the end user's computer/device connects).

[0028] The e-mail notice includes a source address for identifying thesource location (or in some embodiments a specific end user), thedestination address for identifying the destination location (or in someembodiments the specific end user at the destination location) and amessage identifier (ID) which identifies the prepared message. In oneembodiment the message identifier is an identification code. In someembodiments the e-mail notice also includes the formatting protocol ofthe e-mail message. In some embodiments the e-mail notice also includesa message subject or abbreviated message.

[0029] The e-mail message 64 includes the prepared message 52 asformatted and packaged for transmission. In some embodiments theprepared message is compressed using conventional binary formatcompression techniques. The packaging operation includes attachinginformation similar to that in the e-mail notice: a source address,destination address, protocol, and message ID. At step 66 the e-mailnotice is sent over the global information network 10′ to thedestination location 48. As step 68 the e-mail message is transmittedover the global information network 10′ to the forwarding server 50.

[0030] Referring to FIG. 5, at some point after the e-mail notice issent, the receiving end user at step 70 accesses the global informationnetwork 10′. Either automatically or in response to the receiving usercommand, at step 72 access to the receiving end user's mail isrequested. In processing that request, the e-mail notice is received atstep 74 and automatically processed using an application program at thedestination location 48. Such processing includes parsing the message IDand establishing at step 76 a communication pathway with the forwardingserver 50 over the global information network 10′. The destination 48sends contact information 78 including the message ID to the forwardingserver. The destination location 48 waits for the forwarding server 50to respond (or else, for example, a time-out to occur). If contact issuccessful, the forwarding server 50 sends the corresponding e-mailmessage 64 to the destination location. The destination receives thee-mail message 64 at step 80. Upon completion of the transmission, thedestination returns a receipt status 82 at step 84 to the forwardingserver indicating that there was a transmission error or that the e-mailmessage 64 was received successfully. The communication link between theforwarding server 50 and destination 48 terminates after a successfultransmission. After an error, the link is either terminated or a resendis attempted, according to the embodiment.

[0031] Referring to FIG. 6, operation at the forwarding server 50includes at step 86 receiving the e-mail message 64 from the sourcelocation via the global information network 10′. At step 88 the e-mailmessage is stored in a database 89 of messages. A message ID is includedas part of the e-mail message. Such message ID is stored in a table orother database and used as a pointer, index or other reference foraccessing the e-mail message at later time. In some embodiments anexpiration date and time also is assigned to the e-mail message. If thee-mail message is still present on the expiration date, the e-mailmessage 64 is deleted.

[0032] At step 90 the forwarding server 50 receives contact from thedestination location 48, including the contact information 78. Theforwarding server parses out the message ID 60 from the contactinformation 78 and uses the message ID to retrieve the correspondinge-mail message 64 at step 92. The e-mail message 64 then is transmittedat step 94 to the destination over the global information network 10′using a binary formatting transmission protocol. In some embodiments theprotocol is prescribed. In other embodiments, the protocol is includedin the e-mail message and/or the contact information. Upon successfultransfer of the e-mail message to the destination the e-mail message 64at step 98 is deleted at the forwarding server 50. In some embodimentsthe forwarding server tests the receipt status at step 96. If an errorin transmission occurs, then the forwarding server stops. Thedestination either requests a resend (at step 86) or aborts thecommunication.

[0033] Mail-Messaging Method—Alternative Embodiment

[0034] In an alternative embodiment, the destination responds to thee-mail notice by attempting to contact both the source location and theforwarding server. The beginning operations by the source end user arethe same. Specifically, the sending end user creates the preparedmessage 52 at step 54 (see FIG. 4) using a text editor, word processoror other file creating application. At step 56, the end user instigatesthe mail operation, such as by initiating a send command. In response tosuch command, the messaging application at step 58 generates the e-mailnotice 60 and at step 62 generates the e-mail message 64. The messagingapplication is located at the source location 46 (e.g., the end user'scomputer/device, the gateway coupled to the end user's computer/device,or the ISP server to which the end user's computer/device connects).

[0035] The e-mail notice includes the source address for identifying thesource location (or in some embodiments a specific end user), thedestination address for identifying the destination location (or in someembodiments the specific end user at the destination location), and amessage identifier (ID) which identifies the prepared message. In oneembodiment the message identifier is an identification code. In someembodiments the e-mail notice also includes the formatting protocol ofthe e-mail message. In some embodiments the e-mail notice also includesa message subject or abbreviated message.

[0036] The e-mail message 64 includes the prepared message 52 asformatted and packaged for transmission. In some embodiments theprepared message is compressed using conventional binary formatcompression techniques. The packaging operation includes attachinginformation similar to that in the e-mail notice: the source address,destination address, protocol, and message ID. At step 66 the e-mailnotice is sent over the global information network 10′ to thedestination location 48. As step 68 the e-mail message is transmittedover the global information network 10′ to the forwarding server 50.

[0037] Referring to FIG. 7, at some point after the e-mail notice 60 issent, the receiving end user at step 100 accesses the global informationnetwork 10′. Either automatically or in response to the receiving usercommand, at step 102 access to the receiving end user's mail isrequested. In processing that request, the e-mail notice is received atstep 104 and automatically processed using an application program at thedestination location 48. Such processing includes parsing the message IDand attempting to establish at step 106 a communication pathway witheach of the forwarding server 50 and the source location 46 over theglobal information network 10′. The destination 48 sends contactinformation 78 including the message ID to the forwarding server 50 andsource location 46. The destination location 48 waits for the first torespond.

[0038] At step 108 the destination 48 tests whether the forwardingserver 50 is the first to respond. If yes, then at step 110 thedestination tests the response to determine whether the e-mail messagecorresponding to the message ID requested is available. If available,then at step 112, contact with the source location is terminated. Atstep 114, the destination receives the e-mail message 64. Uponsuccessful completion of the transmission, the destination sends areceipt status 82 at step 116 to the forwarding server 50, and in someembodiments to the source location 46, also. If there was a transmissionerror, then the destination sends the error status to the forwardingserver. The communication link between the forwarding server 50 anddestination 48 terminates after a successful transmission. After anerror, the link is either terminated or a resend is attempted, accordingto the embodiment.

[0039] If at step 110, the e-mail message is unavailable from theforwarding server (e.g. the forwarding server has not received thee-mail message yet), then at step 118 the contact with the sourcelocation is tested. If no contact is available with the source location,then at step 120 an indication is given to the receiving end user thatthe e-mail message 64 is unavailable at this time. Alternatively a retryis attempted.

[0040] If at step 108 the source destination is the first to respond, orat step 118 there is contact established with the source location 46,then at step 122 the destination location suspends communication withthe forwarding server 50. At step 124, the destination location receivesthe e-mail message from the source location 46. If at step 126, thetransfer is successful, then the destination location 48 sends a receiptstatus at step 128 to both the source destination and the forwardingserver. The forwarding server in response (see step 96 of FIG. 6)deletes the e-mail message stored at the forwarding server at step 98.If the transfer from the source to the destination is not successfullycompleted, then the destination resumes communication with theforwarding server at step 130. At step 132, the destination locationterminates contact with the source location 46. Processing then goes tostep 110 to determine whether the e-mail message 64 is available fromthe forwarding server. Processing continues from step 110 as previouslydescribed with either a transmission from the forwarding computer to thedestination location (at step 114) or an indication that the message isunavailable (at step 120).

[0041] Referring to FIG. 8, processing at the source 46 is describedresponsive to the contact from the destination 48. At step 140, thesource 46 receives the request from the destination 48 to send thee-mail message 64. The request includes the contact information 78 aspreviously described. The message ID is parsed from the contactinformation 78 and used to retrieve the corresponding e-mail message. Atstep 142 the source 46 commences transmission of the e-mail message tothe destination. The source 46 then tests at step 144 whether there alsois a transmission of the same e-mail message in process to theforwarding server (e.g., the destination was on-line at the time thee-mail notice was received and responded promptly before the e-mailmessage 64 was completely transmitted to the forwarding server). Ifthere is such a transmission in process, then at step 146 thetransmission to the forwarding server 50 is suspended. At step 148 or150 the receipt status then is received from the destination (or atimeout occurs indicating that the contact was inadvertently lost oraborted). At step 152 the receipt status is tested. If successful, thenat step 154 the transmission to the forwarding server is terminated. Ifthe transfer to the destination unsuccessful, then at step 156transmission of the e-mail message 64 to the forwarding sever 50 isresumed.

[0042] With regard to the operations at the forwarding server, theprocess is the same as described with regard to FIG. 6. Note however,that at some point during the transmissions involving the forwardingserver, the communication may be suspended (see step 122, FIG. 7; seestep 146, FIG. 8). Also note that the forwarding server will indicatewhether the e-mail message 64 is available for transmission to thedestination 48. In some embodiments, the e-mail message is unavailableunless completely received from the source 46. In other embodiments, thee-mail message is available in pieces as it becomes available from thesource. In such other embodiments, the operation at step 146 of FIG. 8does not occur until after a prescribed waiting period. The waitingperiod is an estimate of the time required for the destination 48 todetermine the first to respond at step 108 and terminate contact withthe source. In such case, the step 146 is not performed as the processof steps 140-156 is aborted.

[0043] Note that the transmission of the e-mail message from the sourceto either or both of the forwarding server 50 and the destinationlocation 46 is performed using a binary format. Such format usessignificantly less bandwidth than the standard UUencoding used forconventional e-mail applications over the Internet.

[0044] Message Fee Accounting

[0045] According to some embodiments, end users are charged for mailmessaging transmission based upon the actual number of bits successfullytransmitted. This is achieved in response to a status receipt from thedestination of a successful transmission. For a transmission from thesource location 46 to the destination location 48 (e.g., steps 124,128), the source location responds to the status receipt by uploading atstep 160 (see FIG. 8) the number of bits successfully transmitted to thedestination location 48. For a transmission from the forwarding server50 to the destination location 48, the forwarding server responds to thestatus receipt by uploading at step 99 (see FIG. 6) the number of bitssuccessfully transmitted to the destination location 48. Note that insome instances the source or forwarding server receive a successfulreceipt status wile the other performed the transmission. In theinstance where the forwarding server receives such status receipt aftera successful transmission between the source and the destination, thenthere are no bits transmitted from the forwarding server and thedestination. Accordingly, there are not duplicate charges.

[0046] Conventionally, bandwidth is charged based on the size of the“pipes” that are used, eg. the amount of bits per second that is used.Typically, it is based on the maximum level of bits per secondtransferred over a time period, rather than the actual number of bitsused. Sometimes it is possible, instead, to purchase bandwidth based onthe average bandwidth used, which approximates the actual amount of bitstransferred. However, these conventional billing methods do not use anactual number of bits transmitted, and further count all of the packetoverhead and miscellaneous control information.

[0047] By only charging for the actual bits being transferredsuccessfully, it is possible that the invoiced amount is different thanthe amount of bandwidth used. The number of successful transfers aretallied and uploaded from the source and/or forwarding server to anaccounting server. The size of the message is used to calculate theamount that is due for the e-mail message.

[0048] Meritorious and Advantageous Effects

[0049] According to one advantage of the invention, using a binaryprotocol has the advantage of being very compressible using standardcompression algorithms. According to another advantage of the invention,global information network bandwidth used for electronic messaging isreduced.

[0050] Although a preferred embodiment of the invention has beenillustrated and described, various alternatives, modifications andequivalents may be used. Therefore, the foregoing description should notbe taken as limiting the scope of the inventions which are defined bythe appended claims.

What is claimed is:
 1. A method for mail-messaging on a globalinformation network, wherein a user generates a prepared message, themethod comprising the steps of: commencing a first transmission from asource location to a destination address, the frst transmissioncomprising a message identifier corresponding to the prepared message;packaging the prepared message and the corresponding message identifierinto a mail message using a binary formatting protocol; commencing asecond transmission from the source location to a forwarding server, thesecond transmission comprising the mail message, wherein the secondtransmission is independent of the first transmission; receiving themessage identifier at the destination address; and responding at thedestination address to the message identifier by establishing acommunication path to receive the mail message at the destinationaddress.
 2. The method of claim 1, in which establishing a communicationpath comprises contacting the forwarding server with the messageidentifier; the method further comprising the steps of: identifying atthe forwarding server the mail message corresponding to the messageidentifier; and transmitting the mail message from the forwarding serverto the destination address using the binary formatting protocol.
 3. Themethod of claim 1, wherein the step of packaging comprises the step ofcompressing the prepared message.
 4. The method of claim 1, wherein thefirst transmission comprises a mail notice, the mail notice includingthe message identifier and a source address, and wherein the step ofresponding comprises contacting the forwarding server with the messageidentifier specified within the mail notice and contacting the sourceaddress specified within the mail notice; determining which one of thesource address and the forwarding server respond first to contact withthe destination address; commencing receipt of a transmission of themail message in the binary formatting protocol from the one of thesource address and forwarding server which responds first to contactwith the destination address.
 5. The method of claim 4, furthercomprising the step of suspending contact with the other one of thesource address and forwarding server; and upon successful receipt of themail message, notifying the sending address and the forwarding serverthat the mail message has been successfully received.
 6. The method ofclaim 1, wherein the first transmission comprises a mail notice, themail notice comprising the message identifier and a source address, andfurther comprising the steps of: receiving contact at the source addressfrom the destination address; responsive to receiving contact at thesource address, determining whether transmission of the mail messagefrom the source location to the forwarding server is incomplete; andwhen transmission to the forwarding server is still incomplete, pausingtransmission of the mail message from the source location to theforwarding server, and transmitting the mail message from the sourcelocation to the destination address using the binary formattingprotocol.
 7. The method of claim 6, further comprising the steps of:when transmission of the mail message from the source location to thedestination address fails, resuming transmission of the mail messagefrom the source location to the forwarding server; and when transmissionof the mail message from the source location to the destination addresssucceeds, aborting transmission of the mail message from the sourcelocation to the forwarding server.
 8. The method of claim 1, furthercomprising the steps of: determing a tally of bits successfullytransmitted to the destination address; and uploading the tally and thesource address to an accounting server which allocates a fee, based uponthe tally, to an account corresponding to the source address.
 9. Amail-messaging system for managing electronic mail communications overglobal information network, comprising: a source computer at which afirst user generates a prepared message; a destination computer whichreceives the prepared message; a forwarding computer; a mail programwhich processes the prepared message to generate a mail notice and amail message, the mail notice comprising a message identifiercorresponding to the prepared message and a source address, the mailnotice not including an entirety of the prepared message, the mailmessage comprising the prepared message in a prescribed format and themessage identifier; a first communication link between the sourcecomputer and the forwarding server along which the mail message istransmitted; a second communication link between the source computer andthe destination computer along which the mail notice is transmitted; anda mail receipt program which responds to the mail notice to establish athird communication link to receive the mail message at the destinationaddress using a binary formatting transmission protocol.
 10. The systemof claim 9, further comprising: means for the destination computer tocontact the forwarding server with the message identifier; means foridentifying at the forwarding server the mail message corresponding tothe message identifier; and means for transmitting the mail message fromthe forwarding server to the destination address using the binaryformatting transmission protocol.
 11. The system of claim 9, furthercomprising: means for the destination computer to contact the forwardingserver with the message identifier; means for the destination computerto contact the source address; means for determining which one of thesource address and the forwarding server respond first to contact withthe destination address; and means for commencing receipt of atransmission of the mail message in the binary formatting transmissionprotocol from the one of the source address and forwarding server whichresponds first to contact with the destination address.
 12. The systemof claim 11, further comprising: means for suspending contact with theother one of the source address and forwarding server; and means fornotifying the sending address and the forwarding server, upon successfulreceipt of the mail message, that the mail message has been successfullyreceived.
 13. The system of claim 9, further comprising: means forreceiving contact at the source address from the destination address;means, responsive to receiving contact at the source address, fordetermining whether transmission of the mail message from the sourcelocation to the forwarding server is incomplete; and means for pausingtransmission of the mail message from the source location to theforwarding server when transmission to the forwarding server is stillincomplete; and means for transmitting the mail message from the sourcelocation to the destination address using the binary formattingtransmission protocol.
 14. The system of claim 13, further comprising:means for resuming transmission of the mail message from the sourcelocation to the forwarding server when transmission of the mail messagefrom the source location to the destination address fails; and means foraborting transmission of the mail message from the source location tothe forwarding server when transmission of the mail message from thesource location to the destination address succeeds.
 15. The system ofclaim 9, further comprising: means for determing a tally of bitssuccessfully transmitted to the destination address; and means foruploading the tally and the source address to an accounting server whichallocates a fee, based upon the tally, to an account corresponding tothe source address.
 16. A method for mail-messaging on a globalinformation network, wherein a user generates a prepared message, themethod comprising the steps of: sending a message identifiercorresponding to the prepared message from a source location to adestination address, the message identifier being sent to thedestination address without the prepared message; packaging the preparedmessage and the corresponding message identifier into a mail messageusing a binary formatting protocol; commencing transmission of the mailmessage from the source location to a forwarding server; logging ontothe global information network at the destination address; receiving themessage identifier at the destination address; accessing mail destinedfor the destination address, the step of accessing comprisingautomatically responding to the message identifier by contacting theforwarding server, and transmitting the mail message from the forwardingserver to the destination address using the binary formatting protocol;and deleting the mail message from the forwarding server upon receivingan indication of a successful receipt of the mail message at thedestination computer.
 17. The system of claim 16, further comprising:means for determing a tally of bits successfully transmitted to thedestination address; and means for uploading the tally and the sourceaddress to an accounting server which allocates a fee, based upon thetally, to an account corresponding to the source location.