Messaging centre for forwarding e-mail

ABSTRACT

A method for forwarding an e-mail message from an e-mail server to a mobile terminal is provided. An e-mail address of the mobile terminal is associated with an identifier and encryption information, receiving the e-mail message associated with the e-mail address and sent by the e-mail server. The method includes encrypting the e-mail message using the encryption information associated with the e-mail address and transmitting the encrypted e-mail message to the mobile terminal.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.12/228,325 filed Aug. 11, 2008, which is a divisional and claims thepriority benefit of U.S. patent application Ser. No. 11/282,950 filedNov. 21, 2005, which claims the priority benefit of U.S. provisionalpatent application No. 60/650,975 filed Feb. 9, 2005 and the prioritybenefit of Finnish patent application number 20045451 filed Nov. 22,2004, the disclosures of the aforementioned applications beingincorporated herein by reference.

BACKGROUND OF THE INVENTION

Field of the Invention

The invention relates to methods and equipment for transmittingelectronic mail (e-mail) messages to or from a mobile terminal. Morespecifically, the present invention relates to a messaging centre fortransmitting e-mail messages to and from a mobile terminal.

Description of the Related Art

U.S. Pat. No. 6,701,378 to Barry Gilhuly et al. discloses a system andmethod for pushing information, such as e-mail messages, from a hostsystem to a mobile data communication device (mobile terminal). Thetechnique permits e-mail processing at a mobile terminal in addition toa more stationary computer, referred to as a host system in the Gilhulypatent. Specifically, a redirector program operating at the host systemenables a user to continuously redirect certain user-selected data itemsfrom the host system to the user's mobile data communication device upondetecting that one or more user-defined triggering events has occurred.The redirector program operates in connection with event-generatingapplications and repackaging systems at the host system to configure anddetect a particular user-defined event, and then to repackage theuser-selected data items in an electronic wrapper prior to pushing thedata items to the mobile device. The mobile data communication devicemay originate new messages or reply messages to previously receivedinformation, such messages being transmitted to a wireless redirectorhost system, which then transmits a copy of the messages to both theintended recipient and a first electronic mail account associated withthe mobile data communication device.

The above-described prior art technique suffers from certainlimitations. For example, the host system, such as an office computer,and the mobile terminal require separate e-mail accounts. Some e-mailsystems support a forward-type file for forwarding e-mail messages froma first e-mail account to a second e-mail account, but some systems donot support it. It is difficult to set up e-mail systems that do notsupport such forwarding techniques.

Furthermore, the Gilhuly patent does not address issues that relate tomanipulating e-mail messages at the second e-mail account (at the mobileterminal). For instance, it is difficult or impossible to use theterminal to arrange incoming e-mail messages into different folders atthe host system. Also, if the terminal user deletes an incoming e-mailmessage at the terminal, a copy of the deleted message is not present ina “deleted items” folder at the host system, which typically is the casein e-mail systems. Likewise, when the terminal sends an e-mail message,a copy of the message is not added to the host system's “sent items”folder. A further related problem is that e-mail messages that the userhas read at the terminal may appear as unread messages at the hostsystem.

Yet another problem is that configuring an e-mail client software at themobile terminal is difficult because of user interface restrictions intypical mobile terminals.

SUMMARY OF THE INVENTION

Embodiments of the present invention provide for methods and systems formessaging centres for forwarding an e-mail message from an e-mailserver. A permanent terminal identifier of the mobile-terminal and anassociated temporary identifier of the mobile terminal may be stored. Ane-mail message including an indication of a permanent identifier of themobile terminal may be received. The e-mail message may then betransmitted to the mobile terminal using the temporary identifierassociated with the permanent identifier of the mobile terminal.

Various embodiments of the present invention include methods forforwarding an e-mail message from an e-mail server to a mobile terminal.Such methods may include storing a permanent terminal identifier of themobile terminal and an associated temporary identifier of the mobileterminal, receiving the e-mail message, wherein the e-mail messageincludes an indication of the permanent terminal identifier, andtransmitting the e-mail address to the mobile terminal using thetemporary identifier associated with the permanent identifier of themobile terminal. Some embodiments may further include storing the e-mailaddress of the e-mail message in association with the stored permanentand temporary identifier of the mobile terminal. The message may havebeen encrypted, packed, and received from a connectivity application insome embodiments of the present invention. The mobile terminal receivingthe e-mail message may decrypt and unpack the message.

Some embodiments of the present invention further include a system of amemory for storing a permanent identifier of the mobile terminal and anassociated temporary identifier of the mobile terminal, a processorconfigured to execute software stored in memory, the execution of thesoftware resulting in the identification of the mobile terminal based ona received e-mail message including an indication of the permanentidentifier of the mobile terminal and the stored association between thepermanent identifier and the temporary identifier of the mobileterminal, and a communications interface configured to transmit thee-mail message to the identified mobile terminal.

Some embodiments may further include a computer-readable storage mediaupon which is embodied programs including instructions for performingmethods for forwarding an e-mail message from an e-mail server.

BRIEF DESCRIPTION OF THE DRAWINGS

In the following the invention will be described in greater detail bymeans of preferred embodiments with reference to the attached drawings,in which

FIG. 1 shows an exemplary system architecture in which the invention canbe used;

FIG. 2 shows provisioning of an e-mail system;

FIG. 3 shows a hypothetical scenario in which the e-mail system is used;

FIG. 4 shows information flows in mobile-terminated e-mail transmission;

FIG. 5 shows information flows in mobile-originated e-mail transmission;

FIG. 6 shows an enhanced embodiment in which some of the functions ofthe messaging centre are performed by a separate connectivity function;

FIG. 7 shows traffic flow in the embodiment shown in FIG. 6.

DETAILED DESCRIPTION

FIG. 1 shows an exemplary system architecture in which the invention canbe used. Reference numeral 100 denotes a host system that is able tosend an receive e-mail messages. Reference numeral 102 denotes a mobileterminal, also able to send an receive e-mail messages. The e-mailmessages may originate or terminate at external e-mail terminals, one ofwhich is denoted by reference numeral 104. The invention aims atimproving cooperation between the host system 100 and mobile terminal102 such that they can use a single e-mail account as transparently aspossible. This means, for example, that the users of the external e-mailterminals 104, when sending or receiving e-mail, do not need to know ifthe user of the host system 100 actually uses the host system 100 or themobile terminal 102 to communicate via e-mail. The transparency alsomeans that e-mail manipulation at the mobile terminal 102 has, as far aspossible, the same effect as the corresponding e-mail manipulation atthe host system 100. For example, e-mail messages read at the mobileterminal 102 should preferably be marked as read at the host system.

Reference numeral 106 denotes a data network, such as an IP (InternetProtocol) network, which may be the common Internet or its closedsubnetworks, commonly called intranets or extranets. Reference numeral108 denotes an e-mail server and its associated database. The databasestores an e-mail account, addressable by means of an e-mail address,that appears as a mailbox to the owner of the e-mail account. In orderto communicate with mobile terminals 102, the data network 106 isconnected, via a gateway 112 to an access network 114. The accessnetwork comprises a set of base stations 116 to provide wirelesscoverage over a wireless interface 118 to the mobile terminals 102.

Reference numeral 110 denotes a messaging centre that is largelyresponsible for providing the above-mentioned transparency between thehost system 100 and the mobile terminal 102. The system architecturealso comprises a connectivity function, whose task is to push e-mailmessages to the mobile terminal. In the embodiment shown in FIG. 1, theconnectivity function is considered a physically integral but logicallydistinct element of the messaging centre 110. Later, in connection withFIGS. 6 and 7, an enhanced embodiment will be described that explicitlyassigns the security-related functions to the connectivity function andtraffic-related functions to the messaging centre 110.

The mobile terminal 102 may be a pocket or laptop computer with a radiointerface, a smart cellular telephone, or the like. Depending onimplementation, the host system 100, if present, may have differentroles. In some implementations the host system 100 is optional and maybe a conventional office computer that merely acts as the mobileterminal user's principal computer and e-mail terminal. In otherimplementations the host system may act as a platform for a singleuser's connectivity function, in addition to being an office computer.In yet other implementations the host system 100 may comprise theconnectivity function for several users. Thus it is a server instead ofa normal office computer.

We assume here that the access network 114 is able to establish andmaintain a tunnel 120 between the messaging centre 110 and the mobileterminal 102. For instance, the tunnel may be set up using GPRSTunneling Protocol (GTP) or its later derivatives, or any other suitabletunneling protocol.

In a real system, there are naturally a large number of mobile terminals102 and tunnels 120. In order to keep track of which e-mail account andwhich tunnel belongs to which mobile terminal, the messaging centre 110maintains an association 122 for each mobile terminal supported by it.Each association 122 joins three fields, namely an e-mail address 122Aassigned to the mobile terminal or its user, encryption information 122Cand a temporary wireless identity 122D of the mobile terminal in theaccess network. The embodiment shown in FIG. 1 also employs a terminalidentifier 122B which may be the same as the e-mail address 122A of themobile terminal 102, in which case the association 122 actuallyassociates three information items. Alternatively, the terminalidentifier 122B may be an identifier arbitrarily assigned to the mobileterminal. In a preferred implementation the terminal identifier 122B isthe mobile terminal's equipment identifier or its derivative. Theencryption information 122C will be generated by the mobile terminal, asdescribed later in connection with FIG. 2. The temporary wirelessidentity 122D may be the identifier of the tunnel to the mobile station.Of course, the tunnel identifier is not permanent and is only known whena tunnel exists. The creation and use of the association 122 will befurther described in connection with FIGS. 2, 3 and 6.

FIG. 2 shows provisioning of an e-mail system in a system as shown inFIG. 1. The e-mail provisioning phase comprises the following steps. Ina preparatory step (not shown), appropriate e-mail software is installedin the host system 100 (if present) and mobile terminal 102, as well asin the e-mail server 108. For instance, the host system 100, the mobileterminal 102 and the e-mail server 108 may comprise and executeconventional e-mail software, such as Microsoft®. Outlook, which may beaugmented by inventive client software that will be described in moredetail whenever necessary.

After the software installation, the next task is to create a securebinding between the connectivity function and the mobile terminal 102.The idea is to ensure that, in addition to the host system 100, only themobile terminal 102 used in the binding process can be used to accessand manipulate e-mail addressed to the mobile terminal's e-mail address.The binding operation faces two types of security risks. First, thecommunication used during binding must be secured against eavesdroppingor other types of hacking. Second, the only the user of the boundterminal 102 may access e-mail addressed to the e-mail address. Theeavesdropping problem is not trivial in a phase in which no trust existsbetween the mobile terminal 102 and the rest of the system. Yet anotherproblem is that the e-mail server 108 and the messaging centre 110typically have user interfaces that are only accessible to dedicatedsupport persons.

FIG. 2 shows a secure e-mail provisioning technique in which the hostsystem 100 authenticates the user of the mobile terminal 102. In step2-1 the client software in the mobile terminal 102 generates anddisplays a service activation code. In step 2-2 the host system 100authenticates the person who enters the service activation code. Insteadof a dedicated authentication step, the technique may rely on theauthentication of the underlying e-mail system, such as user name andpassword combination. After all, the e-mail provisioning need not bemore secure than the underlying e-mail system. In step 2-3 the serviceactivation code is then conveyed off-line to the host system 100. Theidea of the off-line communication is to eliminate any chance ofeavesdropping before secure a communication channel can be established.For instance, the service activation code may be entered manually or viaa local connection, such as a wired or optical interface or ashort-range wireless interface, such as Bluetooth™. Finally, in step2-4, the mobile terminal's service activation code is registered withthe connectivity function in the messaging centre 110.

The service activation code is closely related to an encryption key tobe used in future communications between the connectivity function inthe messaging centre 110 and the mobile terminal 102. The serviceactivation code and the encryption key may be identical, or one may be asubset of the other, or the encryption key may be derived from theservice activation code by means of some, preferably unpublished,algorithm. The fact that the service activation code and the encryptionkey are closely related to each other ensures that the terminal used inthe authentication process is the terminal used to access the e-mailservice afterwards.

Thus the idea of conveying the service activation code to the messagingcentre 110 via the host system 100 solves both the security-related anduser interface-related problems mentioned above. If there is no hostsystem 100 that can authenticate the mobile terminal and its user.Instead, the user may enter the provisioning data to the connectivityfunction via some suitable connection. The provisioning data entered bythe user may be checked by sending a trial e-mail message and attemptingto read it. If the check succeeds, it is regarded as the authentication.Yet another way is to convey the service activation code to a dedicatedsupport person who performs the authentication (eg by recognizing theperson's face or voice) and enters the service activation code into theconnectivity function in the messaging centre 110. The messagingcentre/connectivity function 110 now stores an association (item 122 inFIG. 1) between the e-mail address 122A and encryption information 122C.

FIG. 3 shows a hypothetical scenario in which the e-mail system is used.This scenario comprises four events, which are delineated by thickdashed lines. The first event, steps 3-10 through 3-16, relate toincoming e-mail. In step 3-10 the external e-mail terminal 104 sends ane-mail message to the e-mail server 108. The e-mail message is addressedto the user of the host system 100. Accordingly, a notification of theincoming e-mail is sent to the host system 100, but that step is omittedfrom FIG. 3 as purely conventional. In step 3-11 the mobile terminal 102requests the access network to establish a tunnel between itself and themessaging centre 110. Step 3-11 may take place before or after step3-10. After the tunnel establishment, the messaging centre 110 nowstores a complete association triplet (item 122 in FIG. 1) that joinsthe e-mail address 122A of the host system 100, the service activationcode 122C of the mobile terminal 102 and the tunnel identifier 122D ofthe tunnel to the mobile terminal 102.

In step 3-12 the messaging centre 110 detects and retrieves the incominge-mail from the e-mail server 108. For instance, the messaging centre110 may regularly poll the e-mail server 108 or it may register itselfas a listener to the e-mail server. In step 3-13 the messaging centre110 encrypts, and optionally packs, the e-mail message or parts of it.For instance, the messaging centre 110 may omit the destination addressof the e-mail message because it is self-evident that the e-mail messageis addressed to the user of the host system 100, who is also the user ofthe mobile terminal 102. The messaging centre 110 may also omit allattachments or large attachments, up to some threshold size, from thee-mail message to be conveyed to the mobile terminal. The encryptionprocess uses the mobile terminal's service activation code 122C, or itsderivative, as the encryption key. In step 3-14 the messaging centre 110transmits the encrypted and packed e-mail to the mobile terminal thatdecrypts and unpacks it in step 3-15. The messaging centre 110 knows thecorrect encryption key (service activation code) 122C and the tunnelidentifier 122D on the basis of the association triplet 122.

In step 3-16 the mobile terminal 102 sends the messaging centre 110 anautomatic control message indicating that the user has read the e-mailmessage. In response to the control message, the messaging centre 110signals the e-mail server 108 to mark the e-mail message as read in step3-17, which act the e-mail server performs in step 3-18. The controlmessage comprises some identification of the e-mail message but not itscontents, whereby it loads the radio interface only lightly. A benefitof the control message is that the user, when beginning to user the hostsystem 100, immediately sees which messages he/she has already read anddoes not have to read them twice.

Next in this scenario, the user decides that the e-mail message needsfurther attention when he/she is at the host system 100. The user mayinitiate another control message 3-20 and 3-21 that causes thepreviously read message to be marked as unread at the e-mail server instep 3-22.

The next phase, steps 3-30 through 3-34, relates to e-mail messagegeneration at the mobile terminal 102. We assume here, that the e-mailmessage to be generated is a reply message to the incoming messagedescribed above (steps 3-10 to 3-17), but the operation is very similarif the message to be generated is an original (non-reply) message. Instep 3-30 the mobile terminal user generates a reply message. Since itis a reply message, its recipient is automatically the sender of theincoming message, and the subject field comprises the original subjectwith a prefix of “RE:” or something similar. If the message is not areply message, the user will have to fill in the recipient and subjectfields. In step 3-31 the client software at the mobile terminal 102encrypts, and optionally packs, the outgoing e-mail message andtransmits it via the tunnel to the messaging centre 110. The messagingcentre 110 does not immediately know the sender of the e-mail message orthe required decryption key. But the messaging centre 110 does know theidentifier of the tunnel 120, and it employs the association triplet 122to retrieve the decryption key 122C and the mobile terminal user'se-mail address 122A. The latter is not included in the e-mail messagetransmitted over the wireless interface 118 in order to load thewireless interface as little as possible. In step 3-32, the messagingcentre 110 employs the decryption key 122C to decrypt the e-mailmessage. It also inserts the mobile terminal user's e-mail address 122A,which is the same as the host system's e-mail address because they sharethe same e-mail account. In step 3-33 the messaging centre 110 signalsthe e-mail server 108 to send a conventional reply message. In step 3-34the e-mail server 108 stores a copy of the message in its “sent items”folder. Because the messaging centre 110 signals the e-mail server 108to send a conventional reply message, the recipient of the message hasno way of knowing that the user actually used the mobile terminal toinitiate the message, and the desired transparency is achieved. Abenefit of the transparency is that when the external terminal 104 sendsa further reply, its user does not need to decide whether to send thereply to the host system or to the mobile terminal.

The final phase, steps 3-41 to 3-43, relate to deletion of an e-mailmessage. In response to the mobile terminal user's deletion command, themobile terminal 102 sends a control message in step 3-41 to themessaging centre 110. In step 3-42 it signals the e-mail server 108 todelete the message, and in step 3-43 the message is moved to the“deleted items” folder, again achieving complete transparency betweenthe host system and the mobile terminal.

As a further example of control messages, the user of the mobileterminal 102 may wish to explicitly move an e-mail message to aparticular folder. In this case the signalling is analogous to steps3-41 to 3-43, except that the message is not deleted but moved to adifferent folder. Only the control message has to be sent via thewireless interface, not the actual e-mail message.

FIG. 4 shows information flows in mobile-terminated e-mail transmission.Reference numeral 400 denotes an e-mail message as it appears on thefixed network side of the wireless interface 118. The e-mail message 400is sent by an external e-mail terminal 104 and processed by the hostsystem 100, the e-mail server 108 and/or the messaging centre 110. Forthe purposes of this description it comprises a source address field401, a destination address field 402, a subject field 403, a messagebody field 404 and, optionally, one or more attachments 405. There maybe other fields, such as cc (carbon copy) or bcc (blind carbon copy) butthey can be ignored in this discussion.

The messaging centre 110 comprises an encryption and packing logic 422that encrypts, and optionally packs (compresses), most of the fields ofthe e-mail message 400. However, the destination address field 402 isnot processed because the mobile terminal will generate it internally.The mobile terminal comprises a decryption and unpacking logic 424 whoseoperation is inverse to the encryption and packing logic 422.

It is also advantageous to implement a filtering logic 430 that filtersout attachments that exceed a threshold size, which is preferablyuser-settable. This means that the user is able to set an upper limitfor attachments that will be sent to the mobile terminal. Omittingattachments saves resources in the wireless interface and the mobileterminal. Instead of filtering long attachments, or in addition to it,the filtering logic 430 may be configured to cut out portions of ane-mail message body that exceeds a threshold size. Reference numeral 410denotes the e-mail message as received and processed by the mobileterminal. Instead of size-based filtering, or in addition to it, thefiltering logic may employ type-based filtering that filters outattachment types that the mobile terminal is not able to process. Forinstance, if the mobile terminal does not have a suitable codec forcertain types of video clips, it is pointless to send such video clipsto the mobile terminal.

FIG. 5 shows information flows in mobile-originated e-mail transmission.Reference numeral 500 denotes an e-mail message generated at the mobileterminal in response to a user input received via the terminal's userinterface. The e-mail message 500 is encrypted, and optionally packed,by an encryption and packing logic 522 that operates similarly to thelogic 422 in the messaging centre. Reference numeral 510 denotes thesame e-mail message after processing by a decryption and unpacking logic524 that reverses the encryption and packing by the logic 522.

The information flows in FIG. 5 are largely analogous to those in FIG.4, and a detailed description is omitted. However, in this direction thesource address, instead of the destination address, is omitted from thepacket sent over the wireless interface. In either direction, the e-mailaddress shared between the host system 100 and the mobile terminal 102is not transmitted over the wireless interface. Another difference toFIG. 4 is absence of the size/type-based filtering logic 430, because inmobile-originated messages the user can each time make the decisionwhether or not to include attachments.

FIG. 6 shows an enhanced embodiment in which some of the functions ofthe messaging centre are performed by a separate connectivity function.In the embodiments described so far the messaging centre 110 wasresponsible for data security issues and traffic coordination to/fromthe access network. In the embodiment shown in FIG. 6 a dedicatedconnectivity function 600 is responsible for the data security issues.FIG. 6 shows an arrangement in which the connectivity function 600 isphysically attached to or co-located with the messaging centre 110, butthey are logically separate elements. Indeed, a definite advantage ofthe separate connectivity function 600 is that it can be detached fromthe messaging centre, for instance, within the company that owns thehost system 100 or the e-mail server 108. For a small number of users,the connectivity function 600 can be installed in each host system 100,or the host system 100 can be interpreted as a separate serverconfigured to support multiple users. It is even possible to implementsome or all the above-mentioned options. This means, for example, thatthere is one or more messaging centres 110 that offer services toseveral network operators, or they may be a dedicated messaging centrefor each network operator (somewhat analogous to short messagingcentres). Each messaging centre 110 may have an integral connectivityfunction 600 to support users who don't wish to install a separateconnectivity function in a host system 100. For users who do install aseparate connectivity function 600 in their host systems 100, suchconnectivity functions bypass the connectivity function in the messagingcentre 110 and address the messaging centre 110 directly.

In the embodiment shown in FIGS. 1 to 3, the messaging centre maintainedan association 122 that joined the e-mail address 122A, terminalidentifier 122B (which may or may not be the same as the e-mailaddress), encryption information 122C and the temporary wirelessidentity 122D of the mobile terminal. In the embodiment shown in FIGS. 6and 7, the association is split into two, such that the connectivityfunction 600 maintains a first association 610 between the e-mailaddress 122A, terminal identifier 122B and the encryption information122C, while the messaging centre 110 maintains a second association 612between the terminal identifier 122B (or e-mail address 122A) and thetemporary wireless identity 122D of the mobile terminal. Thus in thisembodiment the messaging centre 110 does not know or need to know theencryption information 122C, which means that it only forwards trafficwithout being able to interpret it.

A further change caused by the separation (at least logical and,optionally, physical separation) of the connectivity function 600 fromthe messaging centre 110 is the fact that in step 2-4 of FIG. 2, themobile terminal's activation code (or any encryption information basedon it) is not delivered to the messaging centre 110 but to theconnectivity function 600.

FIG. 7 shows traffic flow in the embodiment shown in FIG. 6. Anextensive messaging scenario was described in connection with FIG. 3,and the description of FIG. 7 is restricted to the differences caused bythe separate connectivity function. In step 7-10, the e-mail server 108sends an incoming e-mail message to the connectivity function 600 (cf.steps 3-10 and 3-12 in FIG. 3). In step 7-11, the connectivity function600 encrypts, and optionally packs, the e-mail message. The packingcomprises one or more of the following: data compression, omission ofredundant fields, omission of long attachments and shortening messagebodies (cf. step 3-13 in FIG. 3 and items 422 and 430 in FIG. 4). Instep 7-12, the connectivity function 600 sends the encrypted and packede-mail message to the messaging centre 110. Up to this point, therecipient of the e-mail message has been identified based on the e-mailaddress 122A. In step 7-13, the messaging centre 110 forwards theencrypted and packed e-mail message via the access network to the mobileterminal, but in this step the recipient of the e-mail message isidentified based on the temporary wireless identity 122D of the mobileterminal. In step 7-14 the mobile terminal decrypts and unpacks thee-mail message. The unpacking comprises data decompression and/orregeneration of redundant fields (cf. step 3-15 in FIG. 3 and item 424in FIG. 4). Steps 7-20 through 7-25 relate to mobile-originated e-mailtransmission, and the steps performed are self-explanatory based on theabove descriptions.

As shown on the bottom row of FIG. 7, between the e-mail server 108 andthe connectivity function 600, traffic is identified based on the e-mailaddress 122A. Between the connectivity function 600 and the messagingcentre 110 traffic is identified based on the terminal identifier 122B.Finally, between the messaging centre 110 and the mobile terminal 102,traffic is identified based on the temporary wireless identity 122D,such as the tunnel identifier, TLLI or TMSI.

It is readily apparent to a person skilled in the art that, as thetechnology advances, the inventive concept can be implemented in variousways. The invention and its embodiments are not limited to the examplesdescribed above but may vary within the scope of the claims.

We claim:
 1. A method for forwarding an e-mail message from one of aplurality of e-mail servers to a mobile terminal, the method comprising:receiving, at an intermediary system, an e-mail message associated withan e-mail address of a user of a mobile terminal and sent by one of aplurality of e-mail servers, wherein the e-mail address is associatedwith an identifier of the mobile terminal, wherein an email account,associated with the email address, is hosted by one of the plurality ofe-mail servers, and wherein the identifier is generated by the mobileterminal; encrypting the e-mail message using encryption informationassociated with a temporary identifier, wherein the temporary identifieris based on a connection to the mobile terminal; and transmitting theencrypted e-mail message to the mobile terminal; receiving, at theintermediary system, an automatic control message from the mobileterminal indicating that the user has read the e-mail message; and inresponse to receiving the automatic control message, signaling the oneof a plurality of e-mail servers to mark the e-mail message as read. 2.The method of claim 1, further comprising identifying the mobileterminal based on the e-mail address of the e-mail message and theassociation with the identifier of the mobile terminal.
 3. The method ofclaim 2, further comprising adding the e-mail address to a reply messagesent by the mobile terminal.
 4. The method of claim 1, whereinencrypting the e-mail message further comprises packing the e-mailmessage by omitting at least part of the e-mail message when at leastpart of the e-mail message exceeds a predetermined size specification.5. The method of claim 4, wherein size specification is set by a user ofthe mobile terminal.
 6. The method of claim 4, wherein the omitted partof the e-mail message is the e-mail address.
 7. The method of claim 4,wherein the mobile terminal unpacks the e-mail message.
 8. The method ofclaim 1, further comprising receiving the encryption informationgenerated by the mobile terminal.
 9. The method of claim 1, wherein theencryption information is based on an activation code of the mobileterminal.
 10. The method of claim 1, wherein a messaging centertransmits the e-mail message to the mobile terminal using the identifierof the mobile terminal.
 11. The method of claim 1, wherein mobileterminal receives and decrypts the e-mail message using the encryptioninformation.
 12. The method of claim 1, wherein the identifier isassociated with the temporary identifier.
 13. A system for forwarding ane-mail message from one of a plurality of e-mail servers to a mobileterminal, the system comprising: a memory configured for storing atleast one of an e-mail address of a user of a mobile terminal, and anidentifier; wherein the e-mail address is associated with theidentifier, wherein an email account, associated with the email address,is hosted by one of the plurality of e-mail servers, and wherein themobile terminal generates the identifier, a processor configured for:encrypting the e-mail message using encryption information associatedwith a temporary identifier, wherein the e-mail message is received fromone of a plurality of e-mail servers; identifying the mobile terminalbased on the identifier of the mobile terminal; and transmitting theencrypted e-mail message to the identified mobile terminal, wherein thetemporary identifier is based on a connection to the mobile terminal;receiving, at the intermediary system, an automatic control message fromthe mobile terminal indicating that the user has read the e-mailmessage; and in response to receiving the automatic control message,signaling the one of a plurality of e-mail servers to mark the e-mailmessage as read, wherein the system is an intermediary system betweenthe plurality of e-mail servers and the mobile terminal.
 14. The systemof claim 13, wherein the processor is further configured to receive thee-mail message from the one of a plurality of e-mail servers.
 15. Thesystem of claim 13, wherein the processor is further configured toreceive the encryption information and to provide the encryptioninformation to the memory for storage.
 16. The system of claim 13,wherein the processor is further configured to pack the e-mail message.17. The system of claim 16, wherein the processor is further configuredto omit at least part of the e-mail message when the at least part ofthe e-mail message exceeds a predetermined size specification.
 18. Thesystem of claim 17, wherein the processor is further configured toreceive user input concerning the size specification.
 19. The system ofclaim 13, wherein the mobile terminal receives and decrypts the e-mailmessage using the encryption information.
 20. The system of claim 19,wherein the mobile terminal unpacks the message.
 21. The system of claim13, wherein the identifier is associated with the temporary identifier.22. A device comprising: a radio; a processor and memory containinginstructions executable by the processor whereby the device is operableto: optically receive information including a displayed serviceactivation code from a remote device; register the remote device foraccess to a messaging account using the service activation code; receivea message for the messaging account; encrypt the message using anencryption key; and send the message to the remote device, wherein thedevice is authenticated to access the messaging account.
 23. The deviceof claim 22, wherein the information including the service activationcode is received by the device in response to user input at the remotedevice.
 24. The device of claim 22, wherein the information includingthe service activation code is received by the device in an off-linecommunication.
 25. The device of claim 24, wherein the off-linecommunication involves a local connection.
 26. The device of claim 24,wherein the off-line communication prevents eavesdropping of the serviceactivation code.
 27. The device of claim 22, wherein the authenticationof the device relies on the authentication of the messaging account. 28.The device of claim 27, wherein the authentication of the messagingaccount includes a username and password.
 29. The device of claim 22,wherein the encryption key is the service activation code.
 30. Thedevice of claim 22, wherein the encryption key is derived from theservice activation code.
 31. The device of claim 22, wherein theencryption key is a subset of the service activation code.
 32. Thedevice of claim 22, wherein the encryption key is closely related to theservice activation code.
 33. The device of claim 22, wherein the deviceis further operable to: store an association between at least two of theencryption key, the messaging account, an identifier of the remotedevice, and the service activation code.
 34. The device of claim 22,wherein the message is sent to the remote device through an intermediatedevice.
 35. The device of claim 34, wherein the encryption key isassociated with a temporary identifier, wherein the temporary identifieris based on a connection to the intermediate device.
 36. The device ofclaim 22, wherein a control message is received from the remote deviceupon user interaction with the message.
 37. A method for sharing amessaging account, the method comprising: authenticating a device foraccess to the messaging account; optically receiving informationincluding a displayed service activation code from a remote device;registering the remote device for access to the messaging account usingthe service activation code; receiving a message for the messagingaccount; encrypting the message using an encryption key; and sending themessage to the remote device.
 38. The method of claim 37, wherein theinformation including the service activation code is received by thedevice in response to user input at the remote device.
 39. The method ofclaim 38, wherein the information including the service activation codeis received by the device in an off-line communication.
 40. The methodof claim 39, wherein the off-line communication prevents eavesdroppingof the service activation code.
 41. The method of claim 37, wherein theauthentication of the device relies on the authentication of themessaging system.
 42. The method of claim 41, wherein the authenticationof the messaging system includes a username and password.
 43. The methodof claim 37, wherein the encryption key is the service activation code.44. The method of claim 37, wherein the encryption key is derived fromthe service activation code.
 45. The method of claim 37, wherein theencryption key is a subset of the service activation code.
 46. Themethod of claim 37, wherein the encryption key is closely related to theservice activation code.
 47. The method of claim 37, wherein the methodfurther comprises: storing an association between the encryption key,the messaging account, an identifier of the remote device, and theservice activation code.
 48. The method of claim 37, wherein the messageis sent to the remote device through an intermediate device.
 49. Themethod of claim 37, wherein the encryption key is associated with atemporary identifier, wherein the temporary identifier is based on aconnection to the intermediary device.
 50. The method of claim 37,wherein a control message is received from the remote device upon userinteraction with the message.
 51. A non-transient computer-readablemedium containing program instructions for causing a device to perform amethod, the method comprising: optically receiving information includinga displayed service activation code from a remote device; registeringthe remote device for access to a messaging account using the serviceactivation code; receiving a message for the messaging account;encrypting the message using an encryption key; and sending the messageto the remote device, wherein the device is authenticated to access themessaging account.
 52. The method of claim 51, wherein a control messageis received from the remote device upon user interaction with themessage.