Electronic file transfer for a communications device

ABSTRACT

Systems and methods are provided for identifying an electronic file that is accessible by a communications node to be transmitted to a recipient. A communications device sends an identification of the electronic file. The communications node receives the identification of the electronic file, identifies the electronic file based on the identification, and accesses the electronic file for transmission to the recipient. The electronic file is not transmitted from the communications device to the communications node.

RELATED APPLICATION

This application claims the benefit of previously filed EuropeanApplication No. 06117575.8 filed Jul. 20, 2006 hereby incorporated byreference in its entirety.

This application is a continuation of previously filed U.S. applicationSer. No. 13/466,768 filed May 8, 2012, which in turn is a continuationof previously filed U.S. application Ser. No. 13/162,703 filed Jun. 17,2011, now U.S. Pat. No. 8,204,483, which in turn is a continuation ofpreviously filed U.S. application Ser. No. 12/875,405 filed Sep. 3,2010, now U.S. Pat. No. 7,986,943, which in turn is a continuation ofpreviously filed U.S. application Ser. No. 11/459,242 filed Jul. 21,2006, now U.S. Pat. No. 7,809,356, all hereby incorporated by referencein their entirety.

FIELD OF THE APPLICATION

This application relates to communication systems, and more particularlyto electronic messaging for communications devices.

BACKGROUND

Communications devices capable of sending and receiving electronicmessages such as email messages are used by many. A user may attach anelectronic file to an email message so that the electronic file may besent with the email message. The electronic file may be a text file, avideo file, or any other file. Some electronic files are quite large.

Transmitting large electronic files to and from a communications devicesuch as a wireless device can be problematic because the available datacommunication bandwidth to and from the communications device islimited. Transmitting data to and from the communications deviceoccupies time and valuable bandwidth.

Furthermore, if the communications device is battery powered, thenstrain is placed on the battery during a data transmission.

BRIEF DESCRIPTION OF THE DRAWINGS

Preferred embodiments will now be described with reference to theattached drawings in which:

FIG. 1 is a schematic of an example network having a wireless devicecoupled to a communications node;

FIG. 2 is a schematic of an example network having a communications nodecoupled to an electronic message server;

FIGS. 3 through 7 are flowcharts of example methods of selecting anelectronic file stored in a repository of a communications node to beattached in a new electronic message;

FIG. 8 is a flowchart of an example method of attaching an electronicfile to a new electronic message;

FIG. 9 is a flowchart of an example method of transmitting electronicmessages;

FIG. 10 is a schematic of an example user interface of a wirelessdevice;

FIG. 11 is a schematic of an example menu selection that may bedisplayed by the user interface of FIG. 10;

FIG. 12 is a schematic of an example table of electronic files that maybe displayed by the user interface of FIG. 10;

FIG. 13 is a schematic of another example network having a wirelessdevice coupled to a communications node;

FIG. 14 is a flowchart of an example method of selecting at least oneelectronic file that is accessible by a communications node fortransmission in a communications session;

FIG. 15 is a flowchart of an example method of transmitting at least oneelectronic file in a communications session;

FIG. 16 is a schematic of an example communication system;

FIG. 17 is a schematic showing more detail of the enterprise node shownin FIG. 15; and

FIG. 18 is a schematic showing more detail of one of the major networknodes and collocated equipment shown in FIG. 15.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

It should be understood at the outset that although illustrativeimplementations of one or more embodiments of the present disclosure areprovided below, the disclosed systems and/or methods may be implementedusing any number of techniques, whether currently known or in existence.The disclosure should in no way be limited to the illustrativeimplementations, drawings, and techniques illustrated below, includingthe exemplary designs and implementations illustrated and describedherein, but may be modified within the scope of the appended claimsalong with their full scope of equivalents.

According to a broad aspect, there is provided a method in acommunications device, the communications device being in communicationwith a communications node, the method comprising: accepting user inputfor selecting at least one electronic file accessible by thecommunications node to be attached to a new electronic message beingcomposed; and sending the new electronic message and an identificationof the at least one electronic file, the identification enabling thecommunications node to identify and attach the at least one electronicfile to the new electronic message.

In some embodiments, the new electronic message is selected from a groupconsisting of: an email message, an attachment-enabled PIN message, anda multimedia messaging system (MMS) message.

In some embodiments, the method further comprises: sending theidentification as part of the new electronic message.

In some embodiments, the method further comprises: maintaining a copy ofthe at least one electronic file on the communications device; andsynchronising the copy of the at least one electronic file with the atleast one electronic file accessible by the communications node.

In some embodiments, the at least one electronic file comprises anelectronic file stored in a repository that is accessible by thecommunications node.

In some embodiments, the repository comprises at least one of: anelectronic message application folder, a shared directory of anenterprise network, and an Internet.

In some embodiments, the repository comprises a first location and asecond location, the method further comprising: transmitting a requestto the communications node to copy an electronic file from the firstlocation to the second location.

In some embodiments, the identification of the at least one electronicfile comprises an identifier for identifying the repository and foridentifying the at least one electronic file.

In some embodiments, the method further comprises: generating a messageidentifier based on attributes of the user-selected electronic message;and using the message identifier in the identification of the at leastone electronic file.

In some embodiments, the method further comprises: generating anidentifier based on attributes of the user-selected attachment; andusing the identifier in the identification of the at least oneelectronic file.

In some embodiments, the at least one electronic file comprises at leasta portion of a memo file.

In some embodiments, the identification of the at least one electronicfile comprises a memo identifier for identifying the memo file and theportion of the memo file.

In some embodiments, the at least one electronic file comprises anelectronic file of an Internet.

In some embodiments, the at least one electronic file comprises a webpage.

In some embodiments, the identification of the at least one electronicfile comprises a web identifier for identifying the web page.

In some embodiments, the at least one electronic file comprises anelectronic file accessible from an enterprise network.

In some embodiments, the identification of the at least one electronicfile comprises a network file identifier for identifying the electronicfile accessible from the enterprise network.

In some embodiments, the communications device is selected from a groupconsisting of a wireless device, and a wired device.

In some embodiments, the method further comprises: maintaining a tableof electronic files, the table of electronic files identifying aplurality of electronic files that are accessible by the communicationsnode for attachment to the new electronic message being composed.

In some embodiments, the method further comprises: receiving electronicfiles; and automatically adding an identification of the electronicfiles into the table of electronic files.

In some embodiments, the method further comprises: automaticallyremoving entries from the table of electronic files after a definedperiod of time.

In some embodiments, automatically removing entries from the table ofelectronic files after the defined period of time comprises: acceptinguser input for auto-ageing and removal of entries from the table ofelectronic files.

In some embodiments, accepting user input comprises: accepting userinput for a multiplicity of retention times, the multiplicity ofretention times being selectively applied to entries in the table ofelectronic files.

According to another broad aspect, there is provided a non-transitorycomputer readable medium having computer readable instructions storedthereon for execution on a communications device so as to implement themethod summarised above.

According to another broad aspect, there is provided a communicationsdevice in communication with a communications node, the communicationsdevice comprising: a user interface adapted to accept user input forselecting at least one electronic file accessible by the communicationsnode to be attached to a new electronic message being composed; and anelectronic file identification function adapted to send the newelectronic message and an identification of the at least one electronicfile, the identification enabling the communications node to identifyand attach the at least one electronic file to the new electronicmessage.

In some embodiments, the communications device is selected from a groupconsisting of a wireless device, and a wired device.

According to another broad aspect, there is provided a method in acommunications node, the communications node being in communication witha communications device, the method comprising: receiving a newelectronic message and an identification of at least one electronic fileto be attached to the new electronic message; identifying the at leastone electronic file using the identification; attaching the at least oneelectronic file to the new electronic message; and transmitting the newelectronic message to at least one recipient.

In some embodiments, the repository comprises a first location and asecond location, the method further comprising: upon receiving arequest, copying an electronic file from the first location to thesecond location.

In some embodiments, the method further comprises: accepting input toselectively prevent or permit enterprise-related attachments to be sentusing internet email or non-enterprise instant messaging.

According to another broad aspect, there is provided a non-transitorycomputer readable medium having computer readable instructions storedthereon for execution on a communications node so as to implement themethod summarised above.

According to another broad aspect, there is provided a communicationsnode comprising: an electronic file attachment function adapted to:receive a new electronic message and an identification of at least oneelectronic file to be attached to the new electronic message; identifythe at least one electronic file using the identification; attach the atleast one electronic file to the new electronic message; and transmitthe new electronic message to at least one recipient.

According to another broad aspect, there is provided a user interface ofa communications device, the communications device being incommunication with a communications node, the user interface comprising:a display adapted to display an identification of at least oneelectronic file accessible by the communications node; an input adaptedto accept a user selection of the at least one electronic file to beattached to a new electronic message being composed, and to accept acommand to send the new electronic message and an identification of theuser selection so that the communications node can identify and attachthe at least one electronic file to the new electronic message.

In some embodiments, the display is further adapted to present a tableof electronic files that are immediately available for use asattachments for the new electronic message.

In some embodiments, the table of electronic files comprises at leastone of: a file name attribute indicating file names of the electronicfiles; a file type attribute indicating file extensions of theelectronic files; a file source attribute indicating each of theelectronic files as being enterprise-related or internet-related; a filepublic indication attribute indicating which of the electronic files arepublic; a file date attribute indicating for each of the electronicfiles a date selected from a group consisting of: date of the electronicfile, date of being acquired, and date category, the date category beingselected from a group consisting of today, past week, past month, andpast quarter; and a file note attribute indicating sensitivity ofenterprise-related electronic files.

According to another broad aspect, there is provided a method in acommunications device, the communications device being in communicationwith a communications node, the method comprising: maintaining acommunications session with another communications device; acceptinguser input for selecting at least one electronic file accessible by thecommunications node, the at least one electronic file being selected fortransmission in the communications session; and sending anidentification of the at least one electronic file, the identificationenabling the communications node to identify and transmit the at leastone electronic file in the communications session.

In some embodiments, the communications session is an Instant Message(IM) session.

According to another broad aspect, there is provided a non-transitorycomputer readable medium having computer readable instructions storedthereon for execution on a communications device so as to implement themethod summarised above.

According to another broad aspect, there is provided a communicationsdevice comprising: a communication session function adapted to maintaina communications session with another communications device; a userinterface adapted to accept user input for selecting at least oneelectronic file accessible by the communications node, the at least oneelectronic file being selected for transmission in the communicationssession; and an electronic file identification function adapted to sendan identification of the at least one electronic file, theidentification enabling the communications node to identify and transmitthe at least one electronic file in the communications session.

According to another broad aspect, there is provided a method in acommunications node, the communications node being in communication witha communications device, the method comprising: receiving anidentification of at least one electronic file to be transmitted in acommunications session; identifying the at least one electronic fileusing the identification; and transmitting the at least one electronicfile in the communications session.

According to another broad aspect, there is provided a non-transitorycomputer readable medium having computer readable instructions storedthereon for execution on a communications node so as to implement themethod summarised above.

According to another broad aspect, there is provided a communicationsnode comprising: an electronic file transmission function adapted to:receive an identification of at least one electronic file to betransmitted in a communications session; identify the at least oneelectronic file using the identification; and transmit the at least oneelectronic file in the communications session.

According to another broad aspect, there is provided a user interface ofa communications device, the communications device being incommunication with a communications node, the user interface comprising:a display adapted to display an identification of at least oneelectronic file accessible by the communications node; an input adaptedto accept a user selection of the at least one electronic file to betransmitted in a communications session, and to accept a command to sendan identification of the user selection so that the communications nodecan identify and transmit the at least one electronic file in thecommunications session.

Other aspects and features of the present disclosure will becomeapparent, to those ordinarily skilled in the art, upon review of thefollowing description of specific embodiments of the disclosure.

Wireless Device & Communications Node

Referring to FIG. 1, shown is a schematic of an example network having awireless device 10 coupled to a communications node 30. The wirelessdevice 10 has a wireless access radio 11, a processor 12, an electronicfile identification function 13, and a user interface 14. The wirelessdevice 10 is coupled to the communications node 30 via a wirelesscoupling 20, which in turn is coupled to a plurality of user nodes 50via coupling 40. The communications node 30 has an electronic fileattachment function 31, a processor 32, and a repository 33. Thewireless device 10 and the communications node 30 may have othercomponents, but they are not shown for sake of simplicity.

In operation, the wireless device 10 is adapted to communicate with thecommunications node 30 via the wireless access radio 11 and the wirelesscoupling 20. Such communication may for example include electronicmessages. According to an embodiment of the application, the electronicfile identification function 13 allows a user of the wireless device 10to select and identify an electronic file stored in the repository 33 ofthe communications node 30 for attachment in a new electronic message.The new electronic message may be sent from the wireless device 10without sending the electronic file over the wireless coupling 20.Instead, an identification of the electronic file to be attached to thenew electronic message is sent. The user may compose the new electronicmessage, select the electronic file to be attached, and send the newelectronic message using the user interface 14.

The electronic file attachment function 31 of the communications node 30receives the new electronic message and the identification of theelectronic file, attaches the electronic file to the new electronicmessage, and sends the new electronic message with the electronic fileattached therein to a recipient. The recipient may for example be one ofthe user nodes 50.

The operation of the wireless device 10 and the communications node 30has been described above with reference to a single electronic file.More generally, the user may select a plurality of electronic files tobe attached to the new electronic message.

In some implementations, the electronic file identification function 13and the electronic file attachment function 31 are each implemented assoftware and are respectively executed on the processors 12,32. Moregenerally, the electronic file identification function 13 and theelectronic file attachment function 31 may each be implemented ashardware, software, firmware, or any combination thereof.

There are many possibilities for the repository 33. The repository 33may be any appropriate data storage means, for example a database, or astorage directory. The repository 33 may include a single data storagemeans or a plurality of data storage means. The repository 33 may or maynot physically reside on the communications node 30. The repository 33may reside in any location or combination of locations to which thecommunications node 30 has appropriate access. As a first example, anenterprise network coupled to the communications node may include shareddirectories for storing electronic files. As a second example, theInternet may be used as a repository so that electronic files of theInternet may be accessed by the communications node. Such electronicfiles may for example include web pages.

In some implementations, when the repository 33 is distributed over aplurality of locations, the user is provided with the option of copyingan electronic file from one location to another. For example, if therepository 33 is composed of both a shared directory of an enterprisenetwork and an electronic message application folder of an electronicmessage server, then the user may choose to have an electronic filecopied from the shared directory to the electronic message applicationfolder. The user may decide to do this, for example, if thecommunications node can access the file from the electronic messageapplication folder much faster than from the shared directory. Thismakes the electronic file more accessible for the communications node.In some implementations, the user transmits a request to thecommunications node to have the electronic file copied from a firstlocation to a second location. Other implementations are possible.

There are many possibilities for the wireless coupling 20. In someimplementations, the coupling 20 includes a wireless access network (notshown). In further implementations, the communications node 30 is a partof the wireless access network. In some implementations, the wirelesscoupling 20 includes one or more wired connections to the communicationsnode 30 in addition to one or more wireless connections.

There are many possibilities for the coupling 40. In someimplementations, the coupling 40 includes a wired connection. In someimplementations, the coupling 40 includes a wireless connection. In someimplementations, the coupling 40 includes another communications node,for example an electronic message server. An example of how the coupling40 may include an electronic message server is detailed below. Moregenerally, the coupling 40 may include any network infrastructurebetween the communications node 30 and user nodes 50. If communicationis over the public Internet, the coupling 40 can include any number oflines and networks.

Electronic Message Routing

Referring now to FIG. 2, shown is a schematic of an example networkhaving a communications node 35 coupled to an electronic message server45. The communications node 35 is coupled to the wireless device 10 viawireless coupling 20. The electronic message server 45 is coupled to thecommunications node 35 via coupling 46 and coupled to the user nodes 50via coupling 47.

In operation, the communications node 35 functions much like thecommunications node 30 shown in FIG. 1, but communicates with the usernodes 50 through the electronic message server 45. The electronicmessage server 45 routes electronic messages received from thecommunications node to one or more recipients, for example the usernodes 50. The electronic message server 45 also informs thecommunications node 35 of any electronic messages addressed to thewireless device 10.

The electronic message server 45 may be any appropriate electronicmessage server, for example Microsoft Exchange Outlook, IBM LotusDomino, or Novell GroupWise.

When a user node sends an electronic message addressed to the wirelessdevice 10, the electronic message server receives the electronic messageand routes it to the communications node 35. The communications node 35stores a copy of the electronic message. In some implementations, whenthe electronic message is large, the communications node 35 initiallytransmits only a first portion of the electronic message to the wirelessdevice 10. In a specific example, the first portion is the first 2000bytes of the electronic message. In this example, electronic messagesthat are smaller than 2000 bytes are wholly transmitted. The firstportion contains an identification of the electronic message. If theuser of the wireless device 10 wishes to view more than the firstportion of the electronic message, then the wireless device 10 requestsadditional portions of the electronic message. In some implementations,the request includes the identification of the electronic message. Inresponse, the communications node 35 provides the user with therequested portions of the electronic message.

In some implementations, when there is an electronic message with anattachment addressed to the wireless device 10, the communications node35 initially transmits the electronic message without the attachment. Ifthe user of the wireless device 10 wishes to access the attachment, thenthe wireless device 10 requests the attachment. In some implementations,the request includes an identification of the electronic message and/orthe attachment. In response, the communications node 35 transmits theattachment to the wireless device 10.

In some implementations, when there is an electronic message addressedto the wireless device 10 and the wireless coupling 20 is not available,the communications node 35 places the electronic message into a queue.Once the wireless coupling 20 becomes available again, the electronicmessage or a portion thereof may be transmitted to the wireless device10.

In some implementations, one of the user nodes 50 is a computer havingsynchronised electronic files with the wireless device 10. In a firstexample, electronic messages maintained by the wireless device 10 areidentical to electronic messages maintained by the computer.Accordingly, the user of the computer and the wireless device 10 can useeither the computer or the wireless device 10 for exchanging electronicmessages while having the computer and the wireless device 10synchronised in respect to electronic messages.

Electronic File Selection and Identification

Referring now to FIGS. 3 through 7, shown are flowcharts of examplemethods of selecting an electronic file stored in a repository of acommunications node to be attached in a new electronic message. Thesemethods may be implemented by a wireless device, for example by theelectronic file identification function 13 of the wireless device 10shown in FIG. 1.

The method with reference to FIG. 3 will now be described. At step 3-1,the wireless device accepts user input for selecting an electronic filestored in a repository of the communications node to be attached to anew electronic message being composed. At step 3-2, the wireless devicesends the new electronic message and an identification of the electronicfile. The identification enables the communications node to identify andattach the electronic file to the new electronic message.

In some implementations, the identification of the electronic file issent as part of the new electronic message. In other implementations, itis sent separately and the communications node associates theidentification with the new electronic message by any appropriatemanner.

There is no requirement for the wireless device to have a locally storedcopy of the electronic file for the wireless device to identify theelectronic file for attachment in the new electronic message. However,in some instances the wireless device will have a locally stored copy ofthe electronic file.

In some implementations, the new electronic message sent over the airincludes a message header. This may for example include one or morerecipient addresses, a priority indication, and an address of thesender. The format of the message header may be dependent upon the typeof electronic message being used and the electronic message applicationused to generate the message header.

In some implementations, the new electronic message sent over the airincludes a signature of the sender. In other implementations, the newelectronic message does not include a signature. In otherimplementations, the communications node adds a signature to the newelectronic message before sending it to one or more recipients.

There are many possibilities for the electronic file. In someimplementations, the electronic file may be any electronic file as longas a copy is maintained by the communications node. Although the methodhas been described with reference to a single electronic file, moregenerally, a plurality of electronic files may be selected by the userfor attachment in the new electronic message. The identification of theelectronic file contains an identifier, which may be dependent upon theelectronic file. For example, the way that an identifier identifies anattachment in respect of a previously received message may be differentthan the way that another identifier identifies an electronic filestored in an electronic message application folder. Specific examplesare detailed below with reference to FIGS. 4 through 7.

Electronic Messages

Referring now to FIG. 4, shown is a flowchart of an example method ofselecting a previously received electronic message for attachment in anew electronic message. At step 4-1, the wireless device receiveselectronic messages. At step 4-2, the wireless device accepts user inputfor selecting one of the electronic messages to be attached to a newelectronic message being composed. At step 4-3, the wireless devicesends the new electronic message and an identification of the electronicmessage selected by the user.

In the above example, the electronic message selected by the user is oneof the previously received electronic messages. Alternatively, theelectronic message selected by the user may be an electronic messagecomposed and/or sent by the user as long as the communications node hasmaintained a copy of the electronic message.

In the above example, a single electronic message is selected by theuser to be attached to the new electronic message. Alternatively, theuser may select any number of electronic messages to be attached to thenew electronic message. The electronic messages selectable by the usermay be of any size, and may or may not have attachments therein.

The electronic messages received by the wireless device may be completeelectronic messages or incomplete electronic messages. As describedearlier, the wireless device may receive only a first portion of anelectronic message. The communications node maintains a complete copy ofthe electronic messages.

There are many ways in which the wireless device may send anidentification of the electronic message selected by the user. In someimplementations, an electronic message received, regardless of beingcomplete or incomplete, contains a message identifier. In someembodiments, the message identifier is used as the identification of theelectronic message selected by the user. In other implementations, thewireless device generates the identification based on attributes of theelectronic file selected by the user. Example attributes includetimestamp, addressee, size, etc. Other identification schemes arepossible.

Referring now to FIG. 5, shown is a flowchart of an example method ofselecting an electronic file attached to a previously receivedelectronic message for attachment in a new electronic message. At step5-1, the wireless device receives electronic messages havingattachments. At step 5-2, the wireless device accepts user input forselecting one of the attachments to be attached to a new electronicmessage being composed. At step 5-3, the wireless device sends the newelectronic message and an identification of the attachment selected bythe user.

In the above example, the attachment selected by the user is in respectof a previously received electronic message. Alternatively, theattachment selected by the user may be in respect of an electronicmessage composed and/or sent by the user as long as the communicationsnode has maintained a copy of the attachment.

In the above example, a single electronic file is selected by the userto be attached to the new electronic message. Alternatively, the usermay select any number of electronic files in respect of any number ofelectronic messages to be attached to the new electronic message. Theelectronic files may or may not be electronic messages themselves, maybe of any size, and may or may not have attachments.

The electronic messages received by the wireless device may be completeelectronic messages or incomplete electronic messages. As describedearlier, the wireless device may receive only a first portion of anelectronic message. An incomplete electronic message may for example notinclude its respective attachment. The communications node maintains acomplete copy of the electronic messages and attachments therein.

There are many ways in which the wireless device may send anidentification of the attachment selected by the user. In someimplementations, an electronic message received, regardless of beingcomplete or incomplete, contains an identifier for identifying theelectronic message and/or its respective attachment. In someembodiments, the identifier is used as the identification of theattachment selected by the user. In other implementations, the wirelessdevice generates the identification based on attributes of theattachment selected by the user. Example attributes include file name,file size, etc. Other identification schemes are possible.

Electronic Message Application Folders

In some implementations, the wireless device allows the user to storeelectronic files in an electronic message application folder of thecommunications node and/or electronic message server. The electronicmessage application folder may be in respect of any appropriateelectronic message application, for example Microsoft Exchange Outlook,IBM Lotus Domino, or Novell GroupWise. In some implementations, theelectronic message application folder is an MS Outlook folder of an MSExchange Server and is capable of storing many different types of files,for example email messages, any MS office file, jpeg-files, andpdf-files.

The electronic files may originate from many different sources, forexample electronic messages, the wireless device, or the communicationsnode. In some implementations, electronic files attached to electronicmessages received on the wireless device are added to one or moredesignated electronic message application folders so they are availableeven if the electronic message is deleted. In some implementations, thisis done automatically by setting up a profile to store variouselectronic files. The profile could for example be used to store allelectronic files, electronic files from electronic messages fromspecific addresses, or electronic files attached to electronic messageswith specific subject lines.

In some implementations, there is provided an ageing feature, whichautomatically deletes files from an electronic message applicationfolder when the files are deemed to have been unused for a given timeperiod. In some implementations, the ageing feature is provided as partof a profile and deletes electronic files if the electronic filesoriginated from an electronic message that has been deleted ordetermined to have been unused for a given time period.

In some implementations, electronic files stored in an electronicmessage application folder are synchronised with electronic files on thewireless device so that any changes to the electronic files on thewireless device are reflected in the electronic message applicationfolder and vice-versa.

In some implementations, information sufficient to allow differentelectronic files bearing the same file name in a single electronicmessage application folder is provided.

Referring now to FIG. 6, shown is a flowchart of an example method ofselecting an electronic file of an electronic message application folderfor attachment in a new electronic message. At step 6-1, the wirelessdevice accepts user input for selecting an electronic file stored in anelectronic message application folder of the communications node to beattached to a new electronic message being composed. At step 6-2, thewireless device sends the new electronic message and an identificationof the electronic file.

In the above example, the user selects a single electronic file to beattached to the new electronic message. However, it is possible for theuser to select any number of electronic files.

In some implementations, the identification contains an identifier foridentifying the electronic files that the user has selected. In someimplementations, the identifier is provided to the wireless device bythe communications node. In other implementations, the wireless devicegenerates the identifier. In some implementations, the identifierincludes an identification of the electronic message application folderand a filename. In some implementations, other parameters may beincluded so as to differentiate between different electronic filesbearing the same filename.

Memos

In some implementations, the wireless device allows the user to recordnotes or memos in the form of text in a memo file. A memo file issynchronised between the wireless device and the repository of thecommunications node so that any changes to the memo file on the wirelessdevice are reflected in the repository and vice-versa. In someimplementations, another user node in communication with thecommunications node may access the memo file. The other user node mayread and write to the memo file. When fully synchronised, the copy ofthe memo file in the repository is identical to the copy of the memofile on the wireless device.

Referring now to FIG. 7, shown is a flowchart of an example method ofselecting a memo file for attachment in a new electronic message. Atstep 7-1, the wireless device accepts user input for selecting a memofile to be attached to a new electronic message being composed. At step7-2, the wireless device sends the new electronic message and anidentification of the memo file.

In the above example, the user selects an entire memo file to beattached to the new electronic message. However, it is possible for theuser to select a portion of a memo file. It is also possible to selectmore than one memo file.

In some implementations, the identification contains a memo identifierfor identifying the memo file(s) and what specific portions of the memofile(s) the user has selected. In some implementations, the memoidentifier is provided to the wireless device by the communicationsnode. In other implementations, the wireless device generates the memoidentifier. Other identification schemes are possible.

Many examples have been provided of possible electronic files that theuser may select for attachment in a new electronic message. It is to beunderstood that combinations of such examples are possible. For example,in some implementations, the user may select a memo file and anelectronic message for attachment in the new electronic message.Accordingly, the identification would include any appropriatecombination of identifiers for identifying the memo file and theelectronic message. Other combinations are possible.

Attaching an Electronic File

Referring now to FIG. 8, shown is a flowchart of an example method ofattaching an electronic file to a new electronic message. This methodmay be implemented in a communications node, for example by theelectronic file attachment function 31 of the communications node 30shown in FIG. 1. At step 8-1, the communications node maintains a copyof electronic files on behalf of the wireless device. At step 8-2, thecommunications node receives a new electronic message and anidentification of one of the electronic files. At step 8-3, thecommunications node identifies the electronic file using theidentification sent from the wireless device. At step 8-4, thecommunications node attaches the electronic file to the new electronicmessage. At step 8-5, the communications node sends the new electronicmessage.

In the above example, a single electronic file is attached to the newelectronic message based on the identification received. More generally,a plurality of electronic files may be attached to the new electronicmessage in cases when the user selects a plurality of electronic filesto be attached.

There are many possibilities for the electronic file. As discussedabove, the electronic file may for example be an electronic message, anattachment, an electronic file stored in an electronic messageapplication folder, or a memo file. In the case that the electronic fileis an electronic message received by the wireless device, thecommunications node first transmits the electronic message to thewireless device.

Referring now to FIG. 9, shown is a flowchart of an example method oftransmitting electronic messages. This method may be implemented in acommunications node, for example by the electronic file attachmentfunction 31 of the communications node 30 shown in FIG. 1. At step 9-1,the communications node receives electronic messages addressed to thewireless device. At step 9-2, the communications node stores a copy ofeach electronic message in the repository. At step 9-3, thecommunications node sends each electronic message to the wirelessdevice.

The electronic messages received by the communications node may forexample have been received from an electronic message server, forexample the electronic message server 45 shown in FIG. 2. Otherpossibilities exist.

As previously discussed, the repository may be contained within thecommunications node or reside external to the communications node.

As previously discussed, the communications node may not send each ofthe electronic messages in their entirety to the wireless device. Insome implementations, a portion of each electronic message is sent tothe wireless device. In some implementations, the portion contains anidentifier for identifying the electronic message and any attachmentstherein.

In some implementations, the communications node accepts input toselectively prevent or permit enterprise-related attachments to be sentusing Internet email or non-enterprise instant messaging. This providesfor a policy capability enabling the enterprise (IT group) to prevent orpermit “enterprise-related” attachments to be sent using internet emailor non-enterprise instant messaging.

User Interface

As described above, the user uses a user interface of the wirelessdevice to input their selection of electronic files to be attached to anew electronic message being composed. Referring now to FIG. 10, shownis a schematic of an example user interface 100 of a wireless device.The user interface 100 has a display 101 and an input 102.

In operation, the display 101 is adapted to display choices and optionsfor the user in any appropriate format. The user may input selectionsusing the input 102. The input 102 includes any appropriate componentsso as to allow a user to input selections. This may for example includebuttons, a click wheel, a touch pad, a thumb wheel, or combinationsthereof.

Shown in FIG. 11 is a schematic of an example menu that may be displayedby the display 101 when composing a new message. It is to be understoodthat this is a very specific menu selection for exemplary purposes only.In some implementations, the menu items displayed are dependent oncertain factors. For example, the menu items displayed may be dependenton where a cursor is currently placed, and whether any text has beenhighlighted. The menu items include a number of choices and options forthe user. In particular, the menu selection includes “Attach Message”,“Attach File”, and “Attach Memo” among other possible choices andoptions.

In some implementations, upon selection of “Attach Message”, a secondmenu selection is displayed (not shown) showing possible messages thatmay be attached to the new electronic message. In some implementations,the second menu selection includes a list of all previously receivedelectronic messages. The user may select one or multiple electronicmessages. In specific implementations, consecutive electronic messagesare selected by pressing “num shift” and using a thumbwheel whilenon-consecutive electronic messages are selected by pressing “ALT” foreach electronic message being selected. Other implementations arepossible.

In some implementations, upon selection of “Attach File”, a third menuselection is displayed (not shown) showing possible electronic filesthat may be attached to the new electronic message. In someimplementations, the third menu selection displays in a list allelectronic files that may be attached to the new electronic message. Insome implementations, the list is organised in a manner that visuallyseparates electronic files according to origin. For example, electronicfiles in respect of electronic message attachments and in respect ofelectronic message application folders may be visually separated.

In some implementations, upon selection of “Attach Memo”, a fourth menuselection is displayed (not shown) showing possible memo files that maybe attached to the new electronic message. In some implementations, thefourth menu selection allows one to select more than one memo file orportions of memo files.

In some implementations, the wireless device will display an error orwarning message if any electronic file has not been fully synchronisedwith the repository of the communications node before the user selectsit to be attached. In other implementations, the wireless devicedisplays an error or warning message at the time the user selects anelectronic file if the electronic file has not been fully synchronised.In other implementations, no warning or error messages are provided.

Referring now to FIG. 12, shown is a schematic of an example table ofelectronic files that may be displayed by the user interface of FIG. 10.It is to be understood that the table of electronic files shown in FIG.12 is very specific for exemplary purposes only. The table of electronicfiles lists a plurality of electronic files 126. For each of theelectronic files 126, several attributes are shown. The attributesinclude a file name 120, a file type 121, a file source 122, a filepublic indication 123, a file date 124, and a file note 125.

In some implementations, the table of electronic files is displayed bythe user interface shown in FIG. 10 to provide the user with informationconcerning electronic files that are immediately available for sendingvia email or via instant messaging. In some implementations, electronicfiles that are not immediately available for sending are not displayed.In other implementations, electronic files that are not immediatelyavailable for sending are displayed, but are displayed in a manner thatdistinguishes from the electronic files that are immediately availablefor sending.

The file name 120 may be used by the user to identify the electronicfiles. The file type 121 is indicated as a file extension, for example“pdf” indicates a portable document format. The file source 122indicates the source of the electronic files. For example, “EM-john”indicates that the electronic file was received via email from anotheruser identified as John. The file public indication 123 indicateswhether the electronic files are public or not. In some implementations,if the electronic files are “enterprise-related” (not public) then thiswould be indicated as a reminder that it should be treated with moresensitivity, and only sent on a ‘need-to-know’ basis. The file date 124indicates a date for each electronic file. This may be for example adate of creation, a date of modification, a date of receipt, or a datecategory. In some implementations, the date category includes today,past week, past month, and past quarter. The file note 125 may be usedto further identify the electronic files. In some instances, the filename 120 of an electronic file may not be enough to clearly indicate itscontent. Therefore, the file note 125 enables the user to indicate anelectronic file in more detail.

In some instances, the table of electronic files is too large to beappropriately displayed in its entirety on a single screen. In someimplementations, vertical and/or horizontal scrolling or other meanscould be used to view all information from the table of electronic filesin any appropriate manner.

In some implementations, any message in the mobile device Message Listmay be used as an attachment. If a message is known to be a potentialattachment, it can be tagged (either from the mobile device or from theuser's PC email program), identified as a potential attachment, andplaced as an entry in the mobile device's table of electronic fileswhile placing the actual email in the appropriate repository. If this isdone, then in some implementations the auto-aging of the email mailboxwould not be applied to it, rather the auto-aging or other preference ofthe user would be applied to it.

In some implementations, the table of electronic files shown in FIG. 12may include electronic files that are already stored and available in asingle repository or in a multiplicity of repositories. The lattersituation would be an approach when the mobile communications device isused for both enterprise communications and for personal communicationssuch as “Internet” email or personal Instant Messaging. A folder of theenterprise email server is an example repository for enterprise files. Afolder in the “Internet” email server is another example repository.

In some implementations, the two sets of “attachments” are displayedusing a single table on the mobile device. In some implementations,there are several options available. For example, the user may choosebetween a single table, where the user can choose to display onlyenterprise or only non-enterprise “attachments”, or choose to displayonly certain types of “attachments” (Word documents, Powerpointdocuments, . . . ). As another example, the user is enabled to searchthe list for “attachments” meeting specific criteria. Other options maybe available.

In some implementations, any entry in the Attachment list can be used asan attachment to an email or as a file to be sent over an InstantMessaging session. Accordingly, an email message can be sent either asan email attachment or as a file transmission via an instant messagingsession. In some implementations, if the user wishes to do so, the usercan save an email message as a file in a desired format, access the filein the folder where it had been saved, and send it over the instantmessaging session. Once the email is identified as a potentialattachment, it can immediately be sent over an instant messagingsession.

In some implementations, the communications device automatically removesentries from the table of electronic files after a defined period oftime. There are many ways that this can be accomplished. In someimplementations, the user interface accepts user input for auto-ageingand removal of entries from the table of electronic files. The userinput may for example include a multiplicity of retention times fordifferent entries in the table of electronic files.

Electronic Message Implementations

In the examples described above, references to “electronic messages” aremade. There are many possibilities for the electronic messages. In someimplementations, the electronic messages are any appropriate type ofelectronic message supporting the attachment of electronic files. Forexample, the electronic messages may be email messagesattachment-enabled PIN (personal identification number) messages, ormultimedia messaging system (MMS) messages. In some implementations,combinations of electronic messages are used.

Communication Sessions

In another embodiment, electronic files are transmitted in acommunications session whereby electronic files are not attached to anelectronic message per se. An example of a communications session is anInstant Messaging (IS) session. In the case of transmitting anelectronic file in a communications session, there is no need for thewireless device to transmit an attachment-enabled electronic message tothe communications node, as the electronic file is not attached to anelectronic message. Examples are provided below with reference to FIGS.13 to 15 to illustrate this point.

Referring to FIG. 13, shown is a schematic of an example network havinga wireless device 110 coupled to a communications node 130. The wirelessdevice 110 has a wireless access radio 111, a processor 112, anelectronic file identification function 113, a user interface 114, and acommunication session function 115. The wireless device 110 is coupledto the communications node 130 via a wireless coupling 120, which inturn is coupled to a plurality of user nodes 150 via coupling 140. Thecommunications node 130 has an electronic file transmission function131, a processor 132, and a repository 133. The wireless device 110 andthe communications node 130 may have other components, but they are notshown for sake of simplicity.

In operation, the wireless device 110 is adapted to communicate with thecommunications node 130 via the wireless access radio 111 and thewireless coupling 120. Such communication may for example includecommunication transmitted over a communication session, for example anInstant Message session. The communication session function 115 isadapted to maintain a communication session with another party.According to an embodiment of the application, the electronic fileidentification function 113 allows a user of the wireless device 110 toselect and identify an electronic file stored in the repository 133 ofthe communications node 130 for transmission in the communicationsession. The wireless device 110 transmits an identification of theelectronic file to be transmitted over the communication session. Theelectronic file itself is not transmitted over the wireless coupling120. The user may select the electronic file for example using the userinterface 114.

The electronic file transmission function 131 of the communications node130 receives the identification of the electronic file, identifies theelectronic file using the identification, and transmits the electronicfile in the communication session. The recipient may for example be oneof the user nodes 150.

The operation of the wireless device 110 and the communications node 130has been described above with reference to a single electronic file.More generally, the user may select a plurality of electronic files tobe transmitted over the communication session.

In some implementations, the electronic file identification function 113and the communication session function 115 are each implemented assoftware and are executed on the processor 112. More generally, theelectronic file identification function 113 and the communicationsession function 115 may each be implemented as hardware, software,firmware, or any combination thereof.

In some implementations, the electronic file transmission function 131is implemented as software and is executed on the processor 132. Moregenerally, the electronic file transmission function 131 may beimplemented as hardware, software, firmware, or any combination thereof.

There are many possibilities for the repository 133. The examplesprovided above in respect of the repository 33 shown in FIG. 1 areapplicable to the repository 133. Therefore, such examples are notrepeated.

There are many possibilities for the wireless coupling 120. The examplesprovided above in respect of the coupling 20 shown in FIG. 1 areapplicable to the coupling 120. Therefore, such examples are notrepeated.

There are many possibilities for the coupling 140. The examples providedabove in respect of the coupling 40 shown in FIG. 1 are applicable tothe coupling 140. Therefore, such examples are not repeated.

Referring now to FIG. 14, shown is a flowchart of an example method ofselecting at least one electronic file that is accessible by acommunications node for transmission in a communications session. Thismethod may be implemented by a wireless device, for example by theelectronic file identification function 113 of the wireless device 110shown in FIG. 13. At step 14-1, the wireless device maintains acommunications session with another communications device. At step 14-2,the wireless device accepts user input for selecting at least oneelectronic file that is accessible by the communications node. The atleast one electronic file is selected for transmission in thecommunications node to a recipient. At step 14-3, the wireless devicesends an identification of the at least one electronic file. Theidentification enables the communications node to identify and transmitthe at least one electronic file in the communications node.

Referring now to FIG. 15, shown is a flowchart of an example method oftransmitting at least one electronic file in a communications session.This method may be implemented in a communications node, for example bythe electronic file transmission function 131 of the communications node130 shown in FIG. 13. If at step 15-1 the communications node receivesan identification of at least one electronic file to be transmitted in acommunications session, then at step 15-2 the communications nodeidentifies the at least one electronic file using the identification. Atstep 15-3, the communications node transmits the at least one electronicfile to the recipient in the communications session.

It is to be understood that the description of implementations andvariations provided above in respect of FIGS. 1 through 12 similarlyapply, where appropriate, to the embodiment described above withreference to FIGS. 14 and 15. For example, as previously described,there are many locations in which the at least one electronic file mayreside and still be accessible to the communications node. The at leastone electronic file may reside in any appropriate repository, which mayor may not reside in communications node. For example, the at least oneelectronic file may reside in an electronic message application folderof an electronic message server, a shared directory of an enterprisenetwork, or the Internet.

Communications Device

The examples provided above make specific reference to wireless devices.However, it is to be understood that embodiments of the application arealso applicable to wired devices. More generally, embodiments of theapplication are applicable to any communications device regardless ofwhether the communications device is a wireless device, a wired device,or a device having a combination of wired and wireless connections.

Other Communication Systems

It is to be understood that embodiments of the application areapplicable to a broad range of communication systems. There are manyimplementation specific possibilities for the communication system.Referring now to FIG. 16, shown is a schematic of an examplecommunication system. It is to be understood that this communicationsystem is very specific for exemplary purposes only.

The communication system has a plurality of major nodes 60,70,80including a first major node 60, a second major node 70, and a thirdmajor node 80. Each of the plurality of major nodes is coupled to oneanother and to an Internet 90. The plurality of major nodes 60,70,80with interconnections among some or all of these nodes provide reliableand redundant communication paths between any two major nodes. TheInternet 91 is coupled to a plurality of nodes including an enterprisenode 91. The first major node 60 is coupled to a first collocatedequipment 67 while the second major node 70 is coupled to a secondcollocated equipment 74. In some implementations, the first major node60 is a relay. The first major node 60 is coupled to a first wirelessnetwork 61, a second wireless network 62, and a wired network 63. Thewired network 63 may be any appropriate wired network, for example aPSTN (public switched telephone network), or an ISDN (IntegratedServices Digital Network). A first communications device 64 communicateswith the second wireless network over a wireless connection 65, orcommunicates with the wired network 63 over a wired connection 66. Thesecond major node 70 is coupled to a third wireless network 71. A secondcommunications device 72 communicates with the third wireless network 71over a wireless connection 73. The communication system may have othercomponents, but they are not shown for sake of simplicity.

Referring now to FIG. 17, shown is a schematic showing more detail ofthe Enterprise node 91 shown in FIG. 16. It is to be understood that theenterprise node 91 shown in FIG. 17 is very specific for exemplarypurposes only. An electronic messaging server 92 is coupled to aninstant messaging server(s) 94 and an enterprise server 93. The instantmessaging server(s) 94 and the enterprise server 93 are both coupled toan enterprise data network 96. The enterprise data network 96 hasenterprise servers 97, which in turn have a data repository, namelyshared folders 98 in this example. The electronic messaging server 92and the enterprise data network 92 are both coupled to the Internet 92.There may be other components, but they are not shown for sake ofsimplicity. While elements are shown as separate elements, it is to beunderstood that one or more elements may be combined as a singlecomponent, for example within one computer or multi-computer element. Itis also possible that some of the elements may be at differentlocations, even if the enterprise only has a single campus.

In some implementations, the enterprise node is located on theenterprise premises and is controlled by the enterprise. The enterprisenode is connected to the enterprise's email system, namely theelectronic message server 92 in this example. The enterprise nodeincludes the instant messaging server(s) 94 for the various instantmessaging systems that are provided via mobile devices, and for anyenterprise instant messaging system(s) 94. The instant messagingserver(s) 94 is also connected to the enterprise data network 96.

In some implementations, the enterprise node has a firewall(s) (notshown) or other components to protect the enterprise network fromintrusion by unauthorized parties and from viruses and other malware.

In some implementations, the repository for the enterprise mobile deviceuser is located within the control of the enterprise. In someimplementations, the repository is a folder within the email system foreach email user. In specific implementations, for an MS Exchange server,one “Attachments” folder is provided for each email user. This folderwould be visible to the user within the user's Outlook email client.

In some implementations, attachments of emails sent to the user's mobiledevice via the enterprise server 93 are automatically identified by theenterprise server 93 and placed by the enterprise server 93 in the“Attachments” folder. Alternatively, or in addition to, the user couldon the mobile device identify the attachment and indicate that thatattachment(s) should be placed in the “Attachments” folder. This commandwould be signalled over the wireless or wired communications linkbetween the mobile device and the enterprise server 93. The enterpriseserver 93 would then obtain a copy of the attachment(s) and place theattachment(s) in the “Attachment” folder of the user. Only thesignalling of the command would go over the link between the mobiledevice and the enterprise node and enterprise server 93. The user wouldbe able to give such a command via the mobile device whether or not theemail attachment was itself transmitted to the mobile device. Typically,the email and the identity [filename] of the attachment are visible tothe user on the mobile device.

In some implementations, when the user has an instant messaging sessionin progress on the user's mobile device, the file(s) that the user's IMcorrespondent sends via the IM session would be identified by the IMserver 94 at the enterprise node. The file would be stored on the IMserver 94 in the user's folder, or preferably, in the “Attachments”folder on the electronic message server 92.

In some implementations, the user is able, from the user's PC, to addfiles to the “Attachments” folder. This would enable the user to addfiles that the user may later wish to send via email or instantmessaging from the mobile device. In some implementations, the usersends a command from the mobile device and the files are not transmittedover the air.

Referring now to FIG. 18, shown is a schematic showing more detail ofone of the major network nodes and collocated equipment shown in FIG.16. It is to be understood that the elements depicted in FIG. 18 arevery specific for exemplary purposes only. The major node 60 is a majorcommunications hub interconnecting with the Internet 90, the wirelessand wired networks 61,62,63, other major nodes 70,80, and enterprisenodes. The major node 60 also connects to collocated equipment 67,namely an Internet wireless email server, an Internet Web Access, and anInstant Messaging Server in this example. There may be other components,but they are not shown for sake of simplicity.

The links to the wireless and wired networks 61,62,63 in its sector areused for communication purposes. The links to the other major nodes areused for example so that roaming mobile units can connect from theservice area that they are in to their normal ‘home’ major node. Theconnections to the collocated equipment 67 provide several functions for‘Internet’ [non-enterprise] service for mobile units, for example emailservice, ‘Internet” (web) access, and instant messaging via an IMserver. These non-enterprise mobile units, and the enterprise mobileunits while they are utilizing non-enterprise (i.e. ‘Internet’)services, are provided email service, internet access, and (fornon-enterprise mobile units) instant messaging services.

In some implementations, in a manner similar to that described forenterprise mobile units, the non-enterprise mobile units haveattachments maintained in an “Attachments” folder in the user'spartition of the email server.

Numerous modifications and variations of the present application arepossible in light of the above teachings. It is therefore to beunderstood that within the scope of the appended claims, the applicationmay be practiced otherwise than as specifically described herein.

1. A method for execution by a wireless device configured to communicatewith a communications node via a wireless network, the methodcomprising: accepting user input for selecting at least one electronicfile that is stored in a repository accessible by the communicationsnode to be attached to a new electronic message being composed; andsending the new electronic message and an identification of the at leastone electronic file, the identification enabling the communications nodeto identify and attach the at least one electronic file to the newelectronic message.
 2. The method of claim 1 wherein the repositorycomprises at least one of: an electronic message application folder, ashared directory of an enterprise network, and an Internet.
 3. Themethod of claim 1 wherein the repository comprises a first location anda second location, the method further comprising: transmitting a requestfor the communications node to copy an electronic file from the firstlocation to the second location.
 4. The method of claim 1 wherein theidentification of the at least one electronic file comprises anidentifier for identifying the repository and for identifying the atleast one electronic file.
 5. The method of claim 1 wherein: the atleast one electronic file comprises at least a portion of a memo file;and the identification of the at least one electronic file comprises amemo identifier for identifying the memo file and the portion of thememo file.
 6. The method of claim 1 wherein: the at least one electronicfile comprises a web page from an Internet; and the identification ofthe at least one electronic file comprises a web identifier foridentifying the web page.
 7. The method of claim 1 wherein: the at leastone electronic file comprises an electronic file accessible from anenterprise network; and the identification of the at least oneelectronic file comprises a network file identifier for identifying theelectronic file accessible from the enterprise network.
 8. The method ofclaim 1 further comprising: maintaining a table of electronic files, thetable of electronic files identifying a plurality of electronic filesstored in the repository.
 9. The method of claim 8, wherein maintainingthe table of electronic files comprises: upon receiving electronicfiles, automatically adding an identification of the electronic filesinto the table of electronic files; and automatically removing entriesfrom the table of electronic files after a defined period of time. 10.The method of claim 9 wherein maintaining the table of electronic filesfurther comprises: accepting user input for auto-ageing and removal ofentries from the table of electronic files.
 11. The method of claim 10wherein accepting user input comprises: accepting user input for amultiplicity of retention times, the multiplicity of retention timesbeing selectively applied to entries in the table of electronic files.12. A non-transitory computer readable medium having computer readableinstructions stored thereon for execution on a processor of a wirelessdevice so as to implement the method of claim
 1. 13. A wireless devicecomprising: a wireless access radio configured to communicate with acommunications node via a wireless network; an interface configured toaccept input for selecting at least one electronic file that is storedin a repository accessible by the communications node to be attached toa new electronic message being composed; and an electronic fileidentification function configured to send the new electronic messageand an identification of the at least one electronic file, theidentification enabling the communications node to identify and attachthe at least one electronic file to the new electronic message.
 14. Amethod for execution by a communications node configured to communicatewith a wireless device via a wireless network, the method comprising:maintaining access to a repository; receiving a new electronic messageand an identification of at least one electronic file to be attached tothe new electronic message; identifying the at least one electronic filein the repository using the identification; attaching the at least oneelectronic file to the new electronic message; and transmitting the newelectronic message to at least one recipient.
 15. The method of claim 14wherein the repository comprises at least one of: an electronic messageapplication folder, a shared directory of an enterprise network, and anInternet.
 16. The method of claim 14 wherein the repository comprises afirst location and a second location, the method further comprising:receiving a request to copy an electronic file from the first locationto the second location; and in response to the request, copying theelectronic file from the first location to the second location.
 17. Themethod of claim 14 wherein the identification of the at least oneelectronic file comprises an identifier for identifying the repositoryand for identifying the at least one electronic file.
 18. The method ofclaim 14 further comprising: accepting input to selectively prevent orpermit enterprise-related attachments to be sent using Internet email ornon-enterprise instant messaging.
 19. A non-transitory computer readablemedium having computer readable instructions stored thereon forexecution on a processor of a communications node so as to implement themethod of claim
 14. 20. A communications node configured to communicatewith a wireless device via a wireless network, the communications nodecomprising: a processor; and an electronic file attachment functionconfigured to: maintain access to a repository; receive a new electronicmessage and an identification of at least one electronic file to beattached to the new electronic message; identify the at least oneelectronic file in the repository using the identification; attach theat least one electronic file to the new electronic message; and transmitthe new electronic message to at least one recipient.