Electronic mail system and electronic mail processing method

ABSTRACT

There are stored a plurality of electronic mails each for use in an absence notice, composed of those of an ordinary notice and the other clearly indicating an emergency contact place. If an electronic mail is received, it is determined whether or not the electronic mail is of emergency. If the electronic mail is of emergency, an electronic mail clearly indicating an emergency contact place is transmitted and when not of emergency, a response electronic mail of an ordinary notice which notices the absence is transmitted.

DESCRIPTION

1. Technical Field

The present invention relates to an electronic mail system fortransmission and reception of an electronic mail and a storage mediumstoring a program for electronic mail processing in transmission andreception of an electronic mail.

2. Background Art

An electronic mail system for transmission and reception of anelectronic mail has widely been spread in the society together with therapidly increasing utilization of an electronic mail through an Internetand a personal computer communication network. In conventionalelectronic mail systems, there has been available a service in which atransmitter is noticed of the absence of a receiver to whom anelectronic mail is transmitted. Therefore, the transmitter can confirmwhether or not a transmitted electronic mail has reached the receiver.

However, among electronic mails there is one which has to be urgentlydelivered to a receiver who leaves from a computer. In such a case,there is a problem that the electronic mail cannot be delivered to thereceiver unless either whereabouts of the receiver or an emergencycontact place thereof is known. On the other hand, if the emergencycontact place is noticed to all who are concerned with the receiver,there is a problem that inconveniences frequently arise in thereceiver's privacy and other aspects.

DISCLOSURE OF INVENTION

It is an object of the present invention to facilitate a receiver to bedelivered an electronic mail of emergency when the receiver is absentwithout any inconvenience occurred to the receiver in terms of privacyand other aspects.

According to a first aspect of the present invention, there is providedan electronic mail system comprising:

mail receiving means for receiving an electronic mail;

absence mode setting means for setting an absence mode indicating thestate of absence of a receiver of the electronic mail;

mail transmitting means for transmitting a predetermined fixed form mailresponding to a first electronic mail received by the mail receivingmeans in the absence mode; and

control means for making the mail transmitting means to transmit thepredetermined fixed form mail when the control means determines that asecond electronic mail from a receiver responding to the predeterminedfixed form mail satisfies a specific condition.

According to a second aspect of the present invention, there is providedan electronic mail system comprising:

mail receiving means for receiving an electronic mail;

absence mode setting means for setting an absence mode indicating thestate of absence of a receiver of the electronic mail;

mail transmitting means for transmitting a predetermined fixed form mailresponding to a first electronic mail received by the mail receivingmeans in the absence mode; and

mail transfer means for making the mail transmitting means to transferthe first electronic mail to a predetermined address when the mailreceiving means receives a second electronic mail responding to thepredetermined fixed form mail from the receiver and when the mailtransfer means determines that the second electronic mail satisfies aspecific condition.

According to a third aspect of the present invention, there is providedan electronic mail system comprising:

mail storage means for storing a plurality of fixed form mails;

mail receiving means for receiving an electronic mail;

address designating means for designating an address of a specificreceiver;

mail determining means for determining whether or not a transmitteraddress of the received electronic mail is an address designated by theaddress designating means when it detects that the electronic mail isreceived by the mail receiving means;

mail selecting means for selecting one of the fixed form mails from themail storage means based on a determination result by the maildetermining means; and

mail transmitting means for transmitting the fixed form mail selected bythe mail selecting means to the same address as a transmitter address ofthe received electronic mail.

According to a fourth aspect of the present invention, there is providedan electronic mail system comprising:

mail storage means for storing a plurality of fixed form mails;

mail receiving means for receiving an electronic mail;

mail determining means for determining whether or not identificationinformation is included in the electronic mail when it detects that theelectronic mail is received by the mail receiving means;

mail selecting means for selecting one of fixed form mails stored in themail storage means based on a determination result by the maildetermining means; and

mail transmitting means for transmitting the fixed form mail selected bythe mail selecting means to the same address as a transmitter address ofthe received electronic mail.

According to a fifth aspect of the present invention, there is providedan electronic mail system comprising:

mail receiving means for receiving an electronic mail;

address designating means for designating an address of a specificreceiver;

mail determining means for determining whether or not a transmitteraddress of the received electronic mail is the address designated by theaddress designating means when it detects that the electronic mail isreceived by the mail receiving means;

mail transmitting means for transmitting a fixed form mail to the sameaddress as the transmitter address of the received electronic mail whena determination result by the mail determining means is not thedesignated address; and

mail transfer means for transferring the received electronic mail to apredetermined address when a determination result by the maildetermining means is the designated address.

According to a sixth aspect of the present invention, there is providedan electronic mail system comprising:

mail receiving means for receiving an electronic mail;

mail determining means for determining whether or not a password isincluded in the electronic mail when it detects that the electronic mailis received by the mail receiving means;

mail transmitting means for transmitting a fixed form mail to the sameaddress as a transmitter address of the received electronic mail whenthe mail determining means determines that the password is not included;and

mail transfer means for transferring the received electronic mail to apredetermined address when the mail determining means determines thatthe password is included.

According to a seventh aspect of the present invention, there isprovided an electronic mail system comprising:

mail receiving means for receiving an electronic mail;

date and time setting means for setting a specific period of time;

reception date and time determining means for determining whether or notthe electronic mail is received during the specific period of time bythe mail receiving means;

mail determining means for determining whether or not the electronicmail which is determined to be received during the specific period oftime by the reception date and time determining means is a response dateand time designated mail which designates the response date and time;

response date and time determining means for determining whether or notthe response date and time is in the specific period of time when theelectronic mail is determined to be the response date and timedesignated mail by the mail determining means; and

mail transmitting means for transmitting a response mail requesting fora change of the response date and time to a different response data andtime except the specific period of time when the response date and timewhich is determined by the response date and time determining means isin the specific period of time.

According to an eighth aspect of the present invention, there isprovided an electronic mail system comprising:

mail receiving means for receiving an electronic mail;

date and time setting means for setting a specific period of time;

reception date and time determining means for determining whether or notthe electronic mail is received by the mail receiving means in thespecific period of time;

mail determining means for determining whether or not the electronicmail which is determined to be received by the reception date and timedetermining means in the specific period of time is a response date andtime designated mail which designates the response date and time;

response date and time determining means for determining whether or notthe response date and time is in the designated period of time when theelectronic mail is determined to be the response date and timedesignated mail by the mail determining means;

mail transmitting means for transmitting a request for a change mailrequesting for a change in the response date and time to a differentresponse data and time except the specific period of time when theresponse date and time which is determined by the response date and timedetermining means is in the specific period of time;

date and time changing means for changing the response date and time ofthe response date and time designated mail when the mail receiving meansreceives a response mail which indicates acceptance of the request forchange after the request for change mail is transmitted by the mailtransmitting means; and

mail transfer means for transferring the response date and timedesignated mail to a predetermined address when the mail receiving meansreceives a response mail which refuses the request for change after therequest for change mail is transmitted by the mail transmitting means.

According to a ninth aspect of the present invention, there is providedan electronic mail system comprising:

mail receiving means for receiving an electronic mail;

absence setting means for setting an apparatus operation in an absencemode;

fixed form mail storage means for storing a plurality of fixed formmails;

mail determining means for determining attributes of the receivedelectronic mail when the mail receiving means receives the electronicmail in the absence mode;

mail selecting means for selecting one of fixed form mails stored in themail storage means corresponding to the attributes determined by themail determining means from; and

automatic response means for transmitting the fixed form mail selectedby the mail selecting means in response to the same address as atransmitter of the received electronic mail.

According to a tenth aspect of the present invention, there is providedan electronic mail system comprising:

mail receiving means for receiving an electronic mail;

absence setting means for setting an apparatus operation in an absencemode;

absence notice creation means for creating a plurality of responseconditions for determining whether or not an absence notice is issuedand absence notices having a content corresponding to the plurality ofresponse conditions;

fixed form mail storage means for storing a plurality of responseconditions created by the absence notice creation means and a pluralityof fixed form mails, one constituting the absence notice correspondingto the plurality of response conditions;

mail attribute determined means for determining which plurality ofresponse conditions stored in the fixed form mail storage meansattributes of the received electronic mail satisfy when the mailreceiving means receives the electronic mail in the absence mode; and

absence notice transmitting means for selecting one of fixed form mailsstored in the mail storage means having a content corresponding tosatisfied response conditions to read the fixed form mail from the fixedform mail storage means and to transmit the fixed form mail in responseto the same address as a transmitter of the received electronic mail asan absence notice when the mail attribute determining means finds theresponse conditions which satisfy the attributes of the receivedelectronic mail.

According to an eleventh aspect of the present invention, there isprovided a computer readable storage medium for storing a program forelectronic mail processing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of setting an absence mode indicating the state of absence ofa receiver of the electronic mail;

(iii) step of transmitting a predetermined fixed form mail responding toa first electronic mail received by the step (i) in the absence mode;

(iv) step of determining whether or not a second electronic mail from areceiver responding to the predetermined fixed form mail satisfies aspecific condition; and

step (v) of transmitting a specific fixed form mail when it isdetermined by the step (iv) that the specific condition is satisfied.

According to a twelfth aspect of the present invention, there isprovided a computer readable storage medium for storing a program forelectronic mail processing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of setting an absence mode indicating the state of absence ofa receiver of the electronic mail;

(iii) step of transmitting a predetermined fixed form mail responding toa first electronic mail received by the step (i) in the absence mode;and

(iv) step of making the step (iii) to transfer the first electronic mailto a predetermined address when the it is determined that a secondelectronic mail satisfies a specific condition when the secondelectronic mail responding to the predetermined fixed mail from areceiver of thereof is received at the step (i).

According to a thirteenth aspect of the present invention, there isprovided a computer readable storage medium for storing a program forelectronic mail processing, the program comprising:

(i) step of storing a plurality of fixed form mails;

(ii) step of receiving an electronic mail;

(iii) step of designating an address of a specific receiver;

(iv) step of determining whether or not a transmitter address of thereceived electronic mail is an address designated by the step (iii) whenthe electronic mail is received by the step (ii);

(v) step of selecting one of fixed form mails stored in the mail storagemeans based on a determination result by the step (iv) from theplurality of fixed form mails stored by the step (i); and

(vi) step of transmitting the fixed form mail selected by the step (v)to the same address as a transmitter address of the received electronicmail.

According to a fourteenth aspect of the present invention, there isprovided a computer readable storage medium for storing a program forelectronic mail processing, the program comprising:

(i) step of storing a plurality of fixed form mails;

(ii) step of receiving an electronic mail;

(iii) step of determining whether or not a password is included in theelectronic mail when the electronic mail is received by the step (ii);

(iv) step of selecting one of fixed form mails from the plurality offixed form mails stored by the step (i) based on a determination resultby the step (iii); and

(v) step of transmitting the fixed form mail selected by the step (iv)to the same address as a transmitter address of the received electronicmail.

According to a fifteenth aspect of the present invention, there isprovided a computer readable storage medium for storing a program forelectronic mail processing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of designating an address of a specific receiver;

(ii) step of determining whether or not a transmitter address of thereceived electronic mail is the address designated by the step (ii) whenthe electronic mail is received by the step (i);

(iv) step of transmitting a fixed form mail to the same address as thetransmitter address of the received electronic mail when a determinationresult by the step (iii) is not the designated address; and

(v) step of transferring the received electronic mail to a predeterminedaddress when a determination result by the step (iii) is the designatedaddress.

According to a sixteenth aspect of the present invention, there isprovided a computer readable storage medium for storing a program forelectronic mail processing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of determining whether or not a password is included in theelectronic mail when the electronic mail is received by the step (i);

(iii) step of transmitting a fixed form mail to the same address as atransmitter address of the received electronic mail when the step (ii)determines that the password is not included; and

(iv) step of transferring the received electronic mail to apredetermined address when the step (ii) determines that the password isincluded.

According to a seventeenth aspect of the present invention, there isprovided a computer readable storage medium for storing a program forelectronic mail processing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of setting a specific period of time;

(iii) step of determining whether or not the electronic mail is receivedduring the specific period of time;

(iv) step of determining whether or not the electronic mail is receivedduring the specific period of time is a response date and timedesignated mail which designates the response date and time;

(v) step of determining whether or not the response date and timedesignated by the reception date and time designated mail is in thespecific period of time; and

(vi) step of transmitting a response mail requesting for a change of theresponse date and time to a different response data and time except thespecific period of time when the response date and time is in thespecific period of time.

According to an eighteenth aspect of the present invention, there isprovided a computer readable storage medium for storing a program forelectronic mail processing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of setting a specific period of time;

(iii) step of determining whether or not the electronic mail is receivedduring the specific period of time by the step (i);

(iv) step of determining whether or not the electronic mail which isdetermined to be received during the specific period of time by the step(iii) is a response date and time designated mail which designates theresponse date and time;

(v) step of determining whether or not the response date and time is inthe specific period of time when the electronic mail is determined to bethe response date and time designated mail by the step (iv);

(vi) step of transmitting a request for change mail requesting for achange in the response date and time to a different response data andtime except the specific period of time when the response date and timedetermined by the step (v) is in the specific period of time;

(vii) step of changing the response date and time of the response dateand time designated mail when a response mail which indicates acceptanceof the request for a change is received by the step (i) after therequest for change mail is transmitted by the step (vi); and

(viii) step of transferring the response date and time designated mailto a predetermined address when a response mail which refuses therequest for change is received by the step (i) after the request forchange mail is transmitted by the step (vi).

According to a nineteenth aspect of the present invention, there isprovided a computer readable storage medium for storing a program forelectronic mail processing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of setting an apparatus operation in an absence mode;

(iii) step of storing a plurality of kinds of fixed form mail to fixedform mail storage means;

(iv) step of determining attributes of the received electronic mail whenthe electronic mail is received by the step (i) in the absence mode setby the step (ii);

(v) step of selecting one of fixed form mails from the plurality ofkinds of fixed form mail stored in the fixed form mail storage means atthe step (iii) corresponding to the attributes determined by the step(iv); and

(vi) step of transmitting the fixed form mail selected by the step (v)in response to the same address as a transmitter of the receivedelectronic mail.

According to a twentieth aspect of the present invention, there isprovided a computer readable storage medium for storing a program forelectronic mail processing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of setting an apparatus operation in an absence mode;

(iii) step of creating a plurality of response conditions fordetermining whether or not an absence notice is issued and the absencenotice having a content corresponding to the plurality of responseconditions;

(iv) step of storing a plurality of response conditions produced by thestep (iii) and a plurality of fixed form mails constituting the absencenotice corresponding to the plurality of response conditions to fixedform mail storage means;

(v) step of determining which plurality of response conditions stored inthe fixed form mail storage means attributes of the received electronicmail satisfy when the electronic mail is received in the absence mode bythe step (i); and

(iv) step of selecting one of fixed form mails stored in the mailstorage means having a content corresponding to satisfied responseconditions to read the fixed form mail from the fixed form mail storagemeans and to transmit the fixed form mail in response to the sameaddress as a transmitter of the received electronic mail as an absencenotice when the step (v) finds the response conditions which satisfy theattributes of the received electronic mail.

Additional objects and advantages of the present invention will be setforth in the description which follows, and in part will be obvious fromthe description, or may be learned by practice of the present invention.

The objects and advantages of the present invention may be realized andobtained by means of the instrumentalities and combinations particularlypointed out hereinafter.

BRIEF DESCRIPTION OF DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of the specification, illustrate presently preferred embodiments ofthe present invention and, together with the general description givenabove and the detailed description of the preferred embodiments givenbelow, serve to explain the principles of the present invention inwhich:

FIG. 1 is a block diagram showing a general system configurationaccording to the present invention;

FIG. 2 shows a memory map in a first embodiment;

FIG. 3 is a main flow chart of the first embodiment;

FIG. 4 is a flow chart of reception display processing of the firstembodiment;

FIG. 5 is a flow chart of the reception display processing of the firstembodiment, continued from FIG. 4;

FIG. 6 shows a reception display screen image of the first embodiment;

FIG. 7 is a flow chart of mail display processing of the firstembodiment;

FIG. 8 shows a received mail display screen image of the firstembodiment;

FIG. 9 is a flow chart of mail creation processing of the firstembodiment;

FIG. 10 is a flow chart of the mail creation processing of the firstembodiment, continued from FIG. 9;

FIG. 11 shows a mail creation screen image of the first embodiment;

FIG. 12 is a flow chart of address list display processing of the firstembodiment;

FIG. 13 shows an address list display screen image of the firstembodiment;

FIG. 14 is a flow chart of address list input processing of the firstembodiment;

FIG. 15 is a flow chart of the address list processing of the firstembodiment, continued from FIG. 14;

FIG. 16 shows an address input screen image of the first embodiment;

FIG. 17 is a flow chart of absence setting processing of the firstembodiment;

FIG. 18 is a flow chart of the absence setting processing of the firstembodiment, continued from FIG. 17;

FIG. 19 shows an absence setting processing screen image of the firstembodiment;

FIG. 20 is a flow chart of fixed form mail “A” creation processing ofthe first embodiment;

FIG. 21 is a flow chart of the fixed form mail “A” creation processingof the first embodiment, continued from FIG. 20;

FIG. 22 is a flow chart of fixed form mail “B” creation processing ofthe first embodiment;

FIG. 23 is a flow chart of the fixed form mail “B” creation processingof the first embodiment, continued from FIG. 22;

FIG. 24A and FIG. 24B are views showing fixed form mail “A” and fixedform mail “B” screen images of the first embodiment;

FIG. 25 is a flow chart of timer interrupt processing of the firstembodiment;

FIG. 26 is a flow chart of the timer interrupt processing of the firstembodiment, continued from FIG. 25;

FIG. 27 shows a memory map of a second embodiment;

FIG. 28 is a flow chart of absence setting processing of the secondembodiment;

FIG. 29 is a flow chart of the absence setting processing of the secondembodiment, continued from FIG. 28;

FIG. 30 shows an absence setting processing screen image of the secondembodiment;

FIG. 31 is a flow chart of transfer address input processing of thesecond embodiment;

FIG. 32 is a flow chart of the transfer address input processing of thesecond embodiment, continued from FIG. 31;

FIG. 33 is a flow chart of transfer input processing of the secondembodiment, continued from FIG. 31;

FIG. 34 shows a transfer address input screen image of the secondembodiment;

FIG. 35 is a flow chart of timer interrupt processing of the secondembodiment;

FIG. 36 is a flow chart of the timer interrupt processing of the secondembodiment, continued from FIG. 35;

FIG. 37 is a flow chart of transfer mail creation processing of thesecond embodiment;

FIG. 38 shows a memory map of a third embodiment;

FIG. 39 is a flow chart of absence setting processing of the thirdembodiment;

FIG. 40 is a flow chart of absence setting processing of the thirdembodiment, continued from FIG. 39;

FIG. 41 shows an absence setting processing screen image of the thirdembodiment;

FIG. 42 is a flow chart of address designating processing of the thirdembodiment;

FIG. 43 shows an address list display in address designation of thethird embodiment;

FIG. 44 is a flow chart of fixed form mail creation processing of thethird embodiment;

FIG. 45A and FIG. 45B are views showing fixed form mail “A” and fixedform mail “B” screen images of the third embodiment;

FIG. 46 is a flow chart of timer interrupt processing of the thirdembodiment;

FIG. 47 is a flow chart of the timer interrupt processing of the thirdembodiment, continued from FIG. 46;

FIG. 48 shows a memory map of a fourth embodiment;

FIG. 49 is a flow chart of mail creation processing of the fourthembodiment;

FIG. 50 is a flow chart of mail creation processing of the fourthembodiment, continued from FIG. 49;

FIG. 51 shows a mail creation screen image of the fourth embodiment;

FIG. 52 is a flow chart of absence setting processing of the fourthembodiment;

FIG. 53 is a flow chart of the absence setting processing of the fourthembodiment, continued from FIG. 52;

FIG. 54 is a flow chart of timer interrupt processing of the fourthembodiment;

FIG. 55 is a flow chart of the timer interrupt processing of the fourthembodiment, continued from FIG. 54;

FIG. 56 shows a memory map of a fifth embodiment;

FIG. 57 is a flow chart of absence setting processing of the fifthembodiment;

FIG. 58 is a flow chart of the absence setting processing of the fifthembodiment, continued from FIG. 57;

FIG. 59 shows an absence setting processing screen image of the fifthembodiment;

FIG. 60 is a flow chart of timer interrupt processing of the fifthembodiment;

FIG. 61 is a flow chart of the timer interrupt processing of the fifthembodiment, continued from FIG. 60;

FIG. 62 shows a memory map of a sixth embodiment;

FIG. 63 is a flow chart of absence setting processing of the sixthembodiment;

FIG. 64 is a flow chart of the absence setting processing of the sixthembodiment, continued from FIG. 63;

FIG. 65 shows an absence setting processing screen image of the sixthembodiment;

FIG. 66 is a flow chart of timer interrupt processing of the sixthembodiment;

FIG. 67 is a flow chart of the timer interrupt processing of the sixthembodiment, continued from FIG. 66;

FIG. 68 shows a memory map of a seventh embodiment;

FIG. 69 is a flow chart of reception display processing of the seventhembodiment;

FIG. 70 is a flow chart of the reception display processing of theseventh embodiment, continued from FIG. 69;

FIG. 71 shows a reception display screen image of the seventhembodiment;

FIG. 72 is a flow chart of mail display processing of the seventhembodiment;

FIG. 73 shows a response date and time designated mail display screenimage of the seventh embodiment;

FIG. 74 is a flow chart of response designated mail creation processingof the seventh embodiment;

FIG. 75 is a flow chart of the response designated mail creationprocessing of the seventh embodiment, continued from FIG. 74;

FIG. 76 is a flow chart of the response designated mail creationprocessing of the seventh embodiment, continued from FIG. 74;

FIG. 77 shows a response designated mail creation screen image of theseventh embodiment;

FIG. 78 is a flow chart of absence setting processing of the seventhembodiment;

FIG. 79 is a flow chart of the absence setting processing of the seventhembodiment, continued from FIG. 78;

FIG. 80 is a flow chart of the absence setting processing of the seventhembodiment, continued from FIG. 78;

FIG. 81 shows an absence setting processing screen image of the seventhembodiment;

FIG. 82 is a flow chart of request for change of response mail creationof the seventh embodiment;

FIG. 83 is a flow chart of request for change of response mail creationof the seventh embodiment, continued from FIG. 82;

FIG. 84 is a flow chart of request for change of response mail creationof the seventh embodiment, continued from FIG. 82;

FIG. 85 shows a request for change of response mail creation screenimage of the seventh embodiment;

FIG. 86 is a flow chart of timer interrupt processing of the seventhembodiment;

FIG. 87 is a flow chart of the timer interrupt processing of the seventhembodiment, continued from FIG. 86;

FIG. 88 is a flow chart of the timer interrupt processing of the seventhembodiment, continued from FIG. 86;

FIG. 89 is a flow chart of the timer interrupt processing of the seventhembodiment, continued from FIG. 87;

FIG. 90 shows a memory map of an eighth embodiment;

FIG. 91 is a flow chart of absence setting processing of the eighthembodiment;

FIG. 92 is a flow chart of the absence setting processing of the eighthembodiment, continued from FIG. 91;

FIG. 93 is a flow chart of the absence setting processing of the eighthembodiment, continued from FIG. 91;

FIG. 94 shows an absence setting processing screen image of the eighthembodiment;

FIG. 95 is a flow chart of timer interrupt processing of the eighthembodiment;

FIG. 96 is a flow chart of the timer interrupt processing of the eighthembodiment, continued from FIG. 95;

FIG. 97 is a flow chart of the timer interrupt processing of the eighthembodiment, continued from FIG. 96;

FIG. 98 is a flow chart of the timer interrupt processing of the eighthembodiment, continued from FIG. 96;

FIG. 99 is a flow chart of transfer mail processing of the eighthembodiment;

FIG. 100 shows a memory map of a ninth embodiment;

FIG. 101A and FIG. 101B show memory maps of fixed form mail “A” andfixed form mail “B” of the ninth embodiment;

FIG. 102 shows a memory map of a fixed form mail “C” of the ninthembodiment;

FIG. 103 shows a memory map of a fixed form mail “D” of the ninthembodiment;

FIG. 104 is a flow chart of absence setting processing of the ninthembodiment;

FIG. 105 shows an absence setting processing screen image of the ninthembodiment;

FIG. 106 is a flow chart of fixed form mail “A” creation processing ofthe ninth embodiment;

FIG. 107 is a flow chart of fixed form mail creation processing of theninth embodiment;

FIG. 108 is a flow chart of fixed form mail creation processing of theninth embodiment, continued from FIG. 107;

FIG. 109 is a flow chart of the fixed form mail creation processing ofthe ninth embodiment, continued from FIG. 108;

FIG. 110 shows a fixed form mail “A” screen image of the ninthembodiment;

FIG. 111 is a flow chart of fixed form mail “B” creation processing ofthe ninth embodiment;

FIG. 112 shows a fixed form mail “B” screen image of the ninthembodiment;

FIG. 113 is a flow chart of address designating processing of the ninthembodiment;

FIG. 114 is a flow chart of the address designating processing of theninth embodiment, continued from FIG. 113;

FIG. 115 is a flow chart of the address designating processing of theninth embodiment, continued from FIG. 114;

FIG. 116 shows an address list screen image of the ninth embodiment;

FIG. 117 is a flow chart of fixed form mail “C” creation processing ofthe ninth embodiment;

FIG. 118 is a flow chart of the fixed form mail “C” creation processingof the ninth embodiment, continued from FIG. 117;

FIG. 119 shows a password input screen image of the ninth embodiment;

FIG. 120 shows a fixed from mail “C” screen image of the ninthembodiment;

FIG. 121 is a flow chart of fixed form mail “D” creation processing ofthe ninth embodiment;

FIG. 122 is a flow chart of the fixed form mail “D” processing of theninth embodiment, continued from FIG. 121;

FIG. 123 is a flow chart of the fixed form mail “D” processing of theninth embodiment, continued from FIG. 122;

FIG. 124 shows a fixed form mail “D” screen image of the ninthembodiment;

FIG. 125 is a flow chart of timer interrupt processing of the ninthembodiment;

FIG. 126 is a flow chart of the timer interrupt processing of the ninthembodiment, continued from FIG. 125; and

FIG. 127 is a flow chart of the timer interrupt processing of the ninthembodiment, continued from FIG. 126.

BEST MODE OF CARRYING OUT THE INVENTION

The first to ninth embodiments of the present invention will bedescribed below in reference to FIG. 1 to FIG. 127.

FIG. 1 is a block diagram showing a general constitution of anelectronic mail system according to the present invention. Theembodiments respectively have different constitution of systems anddifferences will be described in respective descriptions of theembodiments whereas the block diagram is commonly used. A plurality ofterminals 100 capable of transmission and reception of an electronicmail are always connected to a server 300 by way of a dedicatedcommunication line 200. Each of the terminals 100 accesses the server300 in response to timer interrupts occurring at predeterminedintervals, inquiries about whether an electronic mail addressed theretoand receives the electronic mail from the server 300 if the mail isarrived there.

In each embodiment, unless otherwise specified, “received mail”indicates a received electronic mail, “transmission mail” an electronicmail to be transmitted, “response mail” an electronic mail in responseto a received mail and “transfer mail” an electronic mail to betransferred to a designated address. In addition, “fixed form mail”indicates a response mail created in advance in a predetermined form.

At each terminal 100, ROM 2, RAM 3, a key board 4, a display section 5,a mouse 6 and a communication control section 7 are mutually connectedby way of an internal system bus. The terminal 100 is connected to thededicated communication line 200 through the communication controlsection 7. ROM 2 stores initial data for a program and initializationprocessing to be executed by CPU 1. RAM 3 stores data of electronicmails for transmission input from the key board 4 and data of electronicmails received from the server 300. For this reason, there are providedin RAM 3, as shown in FIG. 2, a mail creation area, an address area, areceived mail storage area and other areas. CPU 1 is the core of theterminal 100 and corresponding to mail receiving means, absence modesetting means, mail transmitting means, mail transfer means and the likein the embodiments in cooperation with ROM 2, the keyboard 4, the mouse6 and the like connected to the internal system bus.

The mail creation area is an area to store an address, a subject and atext which is a content of a transmission mail. Each address consists ofa receiver address and a transmitter address (self-address). In theaddress area, there are registered M addresses of ADDRESS(1) toADDRESS(M) of the plurality of other terminals 100 which are the otherparties of transmission. Each address is composed of name and address ofthe other party and type of mail. In the received mail storage area,there are included N areas of MAIL(1) to MAIL(N) and the area can storeN received mails. Area data of MAIL(1) to MAIL(N) each are data composedof a transmitter address, a subject, a text, TIME indicating date andtime of reception and an unseal flag KAIFUF. KAIFUF is “1” for anunsealed condition of an received mail and “0” for a sealed condition ofan received mail.

RAM 3 is provided with areas which store respectively two kinds ofdocuments of fixed form mail “A” and fixed form mail “B” to betransmitted. In RAM 3, areas for a plurality of waiting addresses (TAIKIADD) to store addresses of receivers to which fixed form mails haveautomatically been transmitted are provided and the addresses aredesignated by mail numbers “1” to “L”. In addition, there are providedareas for a start date and time, an end date and time of an absentperiod in absence setting, a flag KAIFUTEIF indicating an absencesetting condition, a register “A” and an ON flag ONF. The functions ofthe areas are described later.

In FIG. 1, the key board 4 provides with various kinds of switches (notshown). A mail switch is to start electronic mail processing. Acharacter input switch and a ten key switch are switches for inputtingan address of an electronic mail and a transmission text. The displaysection 5 displays an electronic mail to be transmitted and a receivedelectronic mail. The mouse 6 moves a cursor on the screen image of thedisplay section 5 according to an operation and designates a position ofcharacter inputting from the key board 4. The mouse 6 is clicked at theposition designated by the cursor to perform various selections.

Operations of the first embodiment will be described in reference to aflow chart to be executed by CPU 1 and a screen image displayed in thedisplay section 5.

FIG. 3 is a flow chart of a main routine of CPU 1. In the flow chart, itis determined whether or not the ON flag ONF indicating processing of anelectronic mail (electronic mail processing) is “1” (step A1). If theflag is “1”, reception display processing of the electronic mail isexecuted (step A2) and if the flag is “0”, one of the other processingthan the electronic mail processing is executed (step A3).

After processing of step A2 or S3, the key board 4 is scanned todetermine whether or not switches are turned to the ON states (step A4).If a switch is in the ON state, it is determined whether or not theswitch in the ON state is the mail switch (step A5). If the mail switchis in the ON state, the flag ONF is set at “1” (step A6). After thesetting of flag ONF, if none of the switches are in the ON state at stepA4 or if a switch assuming the ON state at step A5 is not the mailswitch, program flow goes to step A1 and the processing mentioned aboveis repeated.

FIGS. 4 and 5 are flow charts showing a routine of reception displayprocessing at step A2 of FIG. 3. FIG. 6 shows a reception display screenimage. In the top side of the screen image, a plurality of iconscomprising “absence”, “delete”, “mail creation”, “address input”,“unsealing” and “cancel” are displayed. If the mouse 6 is clicked when acursor position is at any one of the icons, processing indicated by theicon is executed. In other words, the icons constitute switches whichare actuated to assume the ON state on clicking of the mouse 6. On otherdisplay screen images in the first embodiment and on display screenimages in the other embodiments as well, switches to be actuated toassume the ON state by clicking of the mouse 6 are displayed.

In FIG. 4, a screen image of a reception mail frame is displayed (stepA10), a pointer “n” designating the number of received mails in thereceived mail storage area 33 of RAM 3 is set at “1” (step A11) and aloop processing from step A12 to step A17 is performed while “n” isincremented, whereby names of transmitters and subjects, reception datesand times and the like are displayed. That is, in the received mailstorage area 33 of FIG. 2, a Received mail MAIL(n) designated by “n” anda reception date and time TIME(n) thereof are displayed on the screenimage (step A12). Then it is determined whether or not a flag KAIFUF(n)of a displayed received mail is “0” (step A13). If the flag KAIFUF(n) is“0”, an unseal mark is displayed in a cell at the left side of a name ofa received mail list of FIG. 6 since the received mail is unsealed (stepA14). At step A13, when the flag KAIFUF(n) is “1”, the seal mark is notdisplayed since the received mail is already unsealed.

Then parameter “n” is incremented (step A15), it is determined whetheror not “n” is the maximum number or less (step A16). If “n” is themaximum number or less, it is determined whether or not a received mail“n” is empty (step A17). If it is not empty, program flow goes to stepA12 and the received mail “n” is displayed on the screen image. A loopof step A12 to step A17 is repeated till the received mail “n” area isempty while “n” is incremented and received mails are displayed insuccession.

If the pointer “n” is more than the maximum number at step A16, or if areceived mail “n” area designated by “n” at step A17 is empty, aregister “A” which designates a received mail to be displayed in reverseis set at “1” (step A18), the RECEIVED MAIL(A) and TIME(A) are displayedin reverse on the screen image of FIG. 6 (step A19). Therefore, in theinitial stage, the name, and reception date and time of a received mailat the first position of a received mail list are displayed in reverse.

Then a cursor is displayed on the screen image (step A20) and a movementof the mouse 6 is checked (step A21). If the mouse 6 has been moved, acursor display is moved in accordance with the movement of the mouse 6(step A22). Then it is determined whether or not the mouse 6 has beenclicked (step A23). If the mouse 6 has not been clicked, program goes tostep A21 and a movement of the mouse 6 is checked. If the mouse 6 hasbeen clicked, it is determined whether or not a cursor position on theclicking is a position on the screen image of the received mail list(step A24). If the cursor position is any position of the received maillist, the pointer “A” is set at the mail number of the cursor position(step A25). Then a list of RECEIVED MAIL(A) and TIME(A) is displayed inreverse (step A26). The other received mail lists displayed in reverseare displayed in normal (step A27). Thereafter, program goes to step A21and a movement of the mouse 6 is checked.

At step A24, if a cursor position is not on the screen image of the maillist, program flow goes to a flow of FIG. 5 and it is determined atwhich of icons of an absence switch, a delete switch, a mail creationswitch, an address input switch, an unseal switch and a cancel switch acursor position in the upper portion of the screen image of FIG. 6 islocated.

In the flow of FIG. 5, it is determined whether or not a cursor positionis the unseal switch position (step A28) and if the cursor position isthis position, mail display processing is executed (step A29). If acursor position is not the unseal switch position, it is determinedwhether or not the cursor position is the mail creation switch position(step A30) and if the cursor position is this position, mail creationprocessing is executed (step A31). If the cursor position is not themail creation switch position either, it is determined whether or notthe cursor position is the absence switch position (step A32) and if thecursor position is this position, absence setting processing is executed(step A33).

If a cursor position is not the absence switch position either, it isdetermined whether or not the cursor position is the address inputswitch position (step A34) and if the cursor position is this position,address input processing is executed (step A35). If a cursor position,is not the address input switch position either, it is determinedwhether or not the cursor position is the delete switch position (stepA36) and if the cursor position is this position, the RECEIVED MAIL(A)and the list of TIME(A) are deleted from RAM 4 (step A37) and KAIFUF(A)is reset at “0” (step A38). Then the received mail area is sorted in theorder of time when being received (step A39). Thereafter, program flowgoes to step A10 of FIG. 4 and display processing of all the receivedmail list except the deleted received mail list is executed.

At step A36 of FIG. 5, if a cursor position is not the deleted switchposition either, it is determined whether or not the cursor position isthe cancel switch position (step A40) and if the cursor position is thisposition, the display of the received mail list is cleared (step A41)and the flag ONF is reset at “0” (step A42). Thereafter, program flow isreturned to the main routine of FIG. 3. At step A40, when a cursorposition is not the cancel switch position either, that is if a cursorposition is not any one of the icon switch positions in the upperportion of the screen image of FIG. 6, program flow goes to step A10 ofFIG. 4 and the screen image of FIG. 6 is again displayed.

FIG. 7 is a flow of mail display processing of step A29 of FIG. 5 andFIG. 8 is a display screen image of a received mail designated byreverse display on the screen image of FIG. 6.

In FIG. 7, a mail display frame screen image is displayed (step A50). Anaddress of a RECEIVED MAIL(A) is displayed in a receiver address in thedisplay frame (step A51), subject data of the RECEIVED MAIL(A) isdisplayed in a subject area (step A52), text data of the RECEIVEDMAIL(A) is displayed in a text area (step A53). In response to an unsealinstruction, KAIFUF(A) is set at “1” (step A54).

Then, a cursor is displayed on a display screen image of FIG. 8 (stepA55) and it is determined whether or not the mouse 6 is moved (stepA56). If the mouse 6 has been moved, the cursor is moved in accordancewith the movement of the mouse 6 (step A57). It is determined whether ornot the mouse 6 has been clicked (step A58). If the mouse 6 has beenclicked, it is determined whether or not a cursor position is the cancelswitch position (step A59), and if the cursor position is this position,the mail display screen image is cleared (step A60) and program flowgoes to step A10 of FIG. 4 to return to the received mail display screenimage of FIG. 6. At step A58, if the mouse 6 has not been clicked, or atstep A59 if the cursor position is not the cancel switch position,program flow goes to step A56 and a movement of the mouse 6 is checked.

FIGS. 9 and 10 are flows of mail creation processing of step A31 of FIG.5 and FIG. 11 is a mail creation screen image.

In FIG. 9, not only is data of the mail creation area of RAM 3 clearedbut a mail creation frame screen image is displayed (step A70). A cursorfor the mouse 6 is displayed on the screen image of FIG. 11 (step A71)and a character cursor is displayed in the address area (step A72).

Then, it is determined whether or not the mouse 6 has been moved (stepA73) and if the mouse 6 has been moved, a cursor position on the screenimage is moved in accordance with the movement of the mouse 6 (stepA74). It is determined whether or not the mouse 6 is clicked (step A75)and if the mouse 6 has been clicked, processing is executed inaccordance with the cursor position in the mail creation screen image ofFIG. 11.

It is determined whether or not a cursor position is a position in theaddress input area (step A76) and if the cursor position is thisposition, a character cursor is set at the address input area (stepA77). If the cursor position is not a position in the address inputarea, it is determined whether or not the cursor position is a positionin the subject input area (step A78) and if the cursor position is thisposition, the character cursor is set at the subject input area (stepA79). If the cursor position is not a position in the subject input areaeither, it is determined whether or not the cursor position is aposition in the text input area (step A80) and the cursor position isthis position, the character cursor is set at the text input area (stepA81).

If a cursor position is not in the text input area either, it isdetermined whether or not a cursor position is the address list switchposition (step A82), and if the cursor position is this position,address display processing is executed (step A83). If a cursor positionis not the address list switch position either, it is determined whetheror not the cursor position is the transmission switch position (stepA84) and if the cursor position is this position, a self-address isstored in the transmission address of the mail creation area of RAM 3(step A85) and transmission processing is executed (step A86). Here, theicon switch for transmission of the screen image may be displayed inreverse. Then, it is determined whether or not the transmissionprocessing has been completed (step A87). If the transmission processinghas not been completed, the transmission processing of step A86 iscontinued. If the transmission processing has been completed, thedisplay of the mail creation screen image is cleared (step A88) andprogram flow goes to step A10 of FIG. 4 and the received mail screenimage of FIG. 6 is displayed.

At step A84 of FIG. 9, when a cursor position is not at the transmissionswitch position, it is determined whether or not the cursor position isthe cancel switch position (step A89-1) and if the cursor position isthis position, a content of a mail buffer is cleared (step A89-2) andprogram flow goes to step A10 of FIG. 4 and the received mail screenimage of FIG. 6 is displayed.

At step A75, if the mouse 6 has not been clicked, in a flow of FIG. 10,it is determined whether or not data input has been made from the keyboard 4 (step A90). If the data input has not been made, program flowgoes to step A73 of FIG. 9 and a movement of the mouse 6 is checked. Ifdata input has been made, it is determined whether or not a charactercursor position is a position in the address input area (step A91). Ifthe character cursor position is this position, input data is displayedin the address input area (step A92) and the input data is stored in theaddress area of a mail creation buffer of RAM 3 (step A93). Then thecharacter cursor is set at a next character input position (step A94).

At step A91, if a character cursor position is not a position in theaddress input area, it is determined whether or not the cursor positionis a position in the subject input area (step A95). If the cursorposition is this position, input data is displayed in the subject inputarea (step A96) and the input data is stored in a mail creation bufferof RAM 3 (step A97). Then, the character cursor is set at a nextcharacter input position (step A98).

At step A95, if a character cursor position is not a position in thesubject input area, it is determined whether or not the cursor positionis a position in the text input area (step A99). If the character cursorposition is this position, input data is displayed in the text inputarea (step A100) and the input data is stored in a text area of the mailcreation buffer of RAM 3 (step A101). Then, the character cursor is setat a next character input position (step A102).

After the character cursor is moved at step A94, step A98 or step A102,program flow goes to step A73 of FIG. 9 and a movement of the mouse 6 ischecked.

FIG. 12 is a flow of address list display processing at step A83 of FIG.9 and FIG. 13 is an address list display screen image.

In FIG. 12, a frame screen image of an address list is displayed (stepA110). Then, a pointer “m” indicating an address number is set at “1”(step A111) and data of the ADDRESS(m) designated by “m” is displayed(step A112). Then, pointer “m” is incremented (step A113) and it isdetermined whether or not “m” exceeds the maximum number (step A114). If“m” is equal to or less than the maximum number, program flow goes tostep A112 and data of the ADDRESS(m) is displayed. Then, a loop of stepsA112, A113 and A114 is repeated till “m” exceeds the maximum numberwhile “m” is incremented.

At step A114, if “m” exceeds the maximum number, a register “A” is setat “1” (step A115) and an ADDRESS(A) of the first position of theaddress list is displayed in reverse (step A116). Then, a cursor isdisplayed on the screen image (step A117) and it is determined whetheror not the mouse has been moved (step A118). If the mouse 6 has beenmoved, a cursor position is moved in accordance with a movement of themouse 6 (step A119). Then, it is determined whether or not the mouse 6has been clicked (step A120) and if the mouse 6 has not been clicked,program flow goes to step A118 and a movement of the mouse 6 is checked.

If the mouse 6 has been clicked, it is determined whether or not acursor position is a position in the address list on the screen image ofFIG. 13 (step A121). If the cursor position is this position, an addressnumber of the cursor position is set to register “A” (step A122). Then,the ADDRESS(A) is displayed in reverse (step A123), the other ADDRESSesare displayed in normal (step A124). Then program flow goes to step A118and a movement of the mouse 6 is checked.

At step A121, if a cursor position is not a position in the addresslist, it is determined whether or not the cursor position is a new inputswitch position on the screen image of FIG. 13 (step A125). If thecursor position is this position, address input processing is executed(step A126). After the address input processing is completed, programflow goes to step A110 and the address list screen image is displayed.

At step A125, if a cursor position is not the new input switch position,it is determined whether or not the cursor position is the cancel switchposition on the screen image (step A127). If the cursor position is thisposition, a display of the address list screen image of FIG. 13 iscleared (step A128) and program flow goes to step A73 of FIG. 9 and amovement of the mouse 6 on the mail creation screen image of FIG. 11 ischecked.

At step A127 of FIG. 12, if a cursor position is not the cancel switchposition, it is determined whether or not the cursor position is thedelete switch position on the screen image of FIG. 13 (step A129). Ifthe cursor position is this position, the ADDRESS(A) is deleted from theaddress area of RAM 3 (step A130) and the address data is sorted insuccession (step A131). Then, program flow goes to step A118 and amovement of the mouse 6 is checked.

At step A129, if a cursor position is not the delete switch position, itis determined whether or not the cursor position is the OK switchposition on the screen image of FIG. 13 (step A132). If the cursorposition is this position, data of the ADDRESS(A) is stored in a mailcreation buffer (step A133) and the address is displayed in the addressarea of a mail creation screen image of FIG. 11 (step A134). Then, thedisplay of the address list screen image of FIG. 13 is cleared (stepA135) and program flow goes to step A73 of FIG. 9 and a movement of themouse 6 on the mail creation screen image of FIG. 11 is checked.

FIGS. 14 and 15 are flows of address input processing at step A35 ofFIG. 5 and step A126 of FIG. 12 and, if the mouse 6 has been clickedwhen a cursor is located at the address input switch position on thescreen image of FIG. 6, or if the mouse 6 has been clicked when a cursoris located at a new input switch position on the screen image of FIG.13, program flow goes to the flow of FIG. 14.

In FIG. 14, a pointer “m” indicating an address number is set at “1”(step A140) and it is determined whether or not an area of theADDRESS(m) is empty (step A141). If the area is not empty, “m” isincremented (step A142) and it is determined whether or not “m” exceedsthe maximum number (step A143). If “m” is equal to or less than themaximum number, program flow goes to step A141 and it is determinedwhether or not the area of the ADDRESS(m) is empty. Then, an empty areais searched by repeating a loop of steps A141, A142 and A143 while “m”is incremented. At step A143, if “m” is the maximum number, a warningdisplay is performed for a predetermined time since there is no emptyarea (step A144).

At step A141, if there is available an ADDRESS(m) with an empty space,the address input screen image shown in FIG. 16 is displayed (stepA145). Not only is a cursor for the mouse 6 displayed on the screenimage (step A146) but a character cursor is displayed in a name inputarea (step A147).

Then, it is determined whether or not the mouse 6 has been moved (stepA148) and if the mouse 6 has bene moved, the cursor is moved inaccordance with the movement of the mouse 6 (step A149). Then, it isdetermined whether or not the mouse 6 has been clicked (step A150) andif the mouse 6 has been clicked, it is determined whether or not thecursor position on clicking is the OK switch position of FIG. 16 (stepA151). If the cursor position is this position, the address input screenimage is cleared (step A152) and program flow goes to step A10 of FIG. 4and the received mail screen image of FIG. 6 is displayed.

At step A151 of FIG. 14, if the position on clicking is not the OKswitch position, it is determined whether or not the cursor position isthe cancel switch position on the screen image of FIG. 16 (step A153).If the cursor position is this position, a content of an ADDRESS(m) iscleared (step A154) and the address input screen image is cleared atstep A152 and program flow goes to step A10 of FIG. 4 and the receivedmail screen image of FIG. 6 is displayed.

At step A153 of FIG. 14, the cursor position is not the cancel switchposition, it is determined whether or not the cursor position is a nameposition (step A155). If the cursor position is this position, acharacter cursor is set at the name input area (step A156). Then,program flow goes to step A148 and a movement of the mouse 6 is checked.At step A155, if a cursor position is not the name position, it isdetermined whether or not the cursor position is the address inputposition (step A157). If the cursor position is this position, acharacter cursor is set at the address input area (step A158). Then,program flow goes to step A148 and a movement of the mouse 6 is checked.

At step A157, if a cursor position is not the address input position, itis determined whether or not the cursor position is a position in thetype input area (step A159). If the cursor position is this position, acharacter cursor is set at the type input area (step A160). Then,program flow goes to step A148 and a movement of the mouse 6 is checked.If a position when the mouse 6 is clicked is not any one of the abovementioned positions, program flow goes to step A148 and a movement ofthe mouse 6 is checked.

At step A150, if the mouse 6 has not been clicked, program flow goes tothe flow of FIG. 15 and it is determined whether or not data input hasbeen made (step A161). If data input has been made, it is determinedwhether or not a character cursor position is the name position (stepA162). If the cursor position is this position, the data input to thename input area is displayed (step A163) and the data input in a nameinput area of an ADDRESS(A) of RAM 3 in FIG. 2 are stored (step A164).Then, the character cursor position is moved (step A165).

At step A162, if a cursor position is not the name position, it isdetermined whether or not the character cursor position is the addressinput position (step A166). If the cursor position is this position,data input in the address input area is displayed (step A167) and datainput in an address area of the ADDRESS(A) of RAM 3 are stored (stepA168). Then, the character cursor position is moved (step A165).

At step A166, if a character cursor position is not the address inputposition, it is determined whether or not the character cursor positionis a position in the type input area (step A169). If the charactercursor position is this position, data input in the type input area aredisplayed (step A170), data input in the address input area of RAM 3 aredisplayed (step A171) and data input in the type input area of anADDRESS(A) of RAM 3 are stored (step A172). Then, the character cursorposition is moved (step A165).

At step A165, after the character cursor is moved, or if the charactercursor position is not any one of the above mentioned positions of name,address input and type input, or if data input is not made at step A161,program flow goes to step A148 of FIG. 14 and a movement of the mouse 6is checked.

FIGS. 17 and 18 are flows of absence setting processing at step A33 ofFIG. 5 and FIG. 19 is an absence setting processing screen image.

In FIG. 17, a time setting screen image is displayed in the absencesetting processing screen image of FIG. 19 (step A180) and a charactercursor is set at a start date and time area (step A181). Then, a cursorfor the mouse 6 is displayed (step A182). Then, it is determined whetheror not the mouse 6 has been moved (step A183) and if the mouse 6 hasbeen moved, the cursor is moved in accordance with the movement of themouse 6 (step A184). Then, it is determined whether or not the mouse 6is clicked (step A185). If the mouse 6 has been clicked, it isdetermined whether or not a cursor position is in the start date andtime area (step A186). If the cursor position is this position, acharacter cursor is set at the start data and time area (step A187).

If a cursor position is not the start date and time area, it isdetermined the cursor position is in an end date and time area (stepA188). If the cursor position is this position, a character cursor isset at the end date and time area (step A189). If a cursor position isnot an end date and time area, it is determined whether or not thecursor position is a position of the mail “A” creation switch on thescreen image of FIG. 19 (step A190). If the cursor position is thisposition, a fixed form mail “A” creation processing is executed (stepA191). A content of a mail buffer is stored in the fixed form mail “A”area of RAM 3 of FIG. 2 (step A192).

At step A190, if a cursor position is not the mail “A” creation switchposition, it is determined whether or not the cursor position is a mail“B” creation switch position on the screen image of FIG. 19 (step A193).If the cursor position is this position, a fixed form mail “B” creationprocessing is executed (step A194). A content of a mail buffer is storedin the fixed form mail “B” area of RAM 3 of FIG. 2 (step A195).

At step A193, if a cursor position is not the mail “B” creation switchposition, it is determined whether or not the cursor position is an OKswitch position (step A196). If the cursor position is this position,the absence setting processing screen image of FIG. 19 is cleared and adefinite flag KAKUTEIF is set at “1” (step A197). Thereafter, programflow goes to step A10 of FIG. 4 and the received mail screen image ofFIG. 6 is displayed.

At step A196, if a cursor position is not the OK switch position, it isdetermined whether or not the cursor position is the cancel switchposition (step A198). If the cursor position is this position, data of amail “A”, a mail “B”, and a date and time areas are cleared (step A199),the absence setting processing screen image of FIG. 19 is cleared andthe definite flag KAKUTEIF is reset at “0” (step A200). Thereafter,program flow goes to step A10 of FIG. 4 and the received mail screenimage of FIG. 6 is displayed.

At step A198, if a cursor position is not the cancel switch position,that is if a cursor position is not any one of the above mentionedpositions, or after processing in accordance with a cursor position iscompleted, program flow goes to step A183 and a movement of the mouse 6is checked.

At step A185, if the mouse 6 has not been clicked, program flow goes toa flow of FIG. 18 and it is determined whether or not data input hasbeen made from the key board 4 (step A201). If the data input has beenmade, it is determined a character cursor position is in the start dateand time area (step A202). If the cursor position is this position,start date and time data input to the date and time area are displayed(step A203) and the start date and time data are stored in RAM 3 (stepA204). The character cursor is moved (step A205).

At step A202, if a character position is not the start date and timeposition, it is determined whether or not a character cursor position isan end date and time position (step A206). If the character cursorposition is this position, end date and time data input to the end dateand time area is displayed (step A207) and the data of the end date andtime are stored in RAM 3 (step A208). Then, the character cursor ismoved (step A205).

After the character cursor is moved at step A205, or if data input hasnot made at step A201 or if a cursor position is not any one of thestart date and time, and end date and time positions, program flow goesto step A183 of FIG. 17 and a movement of the mouse 6 is checked.

FIGS. 20 and 21 are flows of a fixed form mail “A” creation processingat step A191 of FIG. 17 and FIG. 24A is a fixed form mail “A” displayscreen image. FIG. 24A clearly indicates an absent period andsimultaneously an electronic mail clearly indicating an emergencycontact place in the absent period. In the screen image, an OK switch, acancel switch and in addition to them a password switch are provided.

In FIG. 20, a transmitter address is set as a self-address (step A210).Then, a fixed form mail creation frame screen image is displayed (stepA211). A cursor for the mouse 6 is displayed (step A212) and a charactercursor is displayed in a subject area (step A213).

Then, it is determined whether or not the mouse 6 has been moved (stepA214) and if the mouse 6 has been moved, a cursor position on the screenimage is moved in accordance with the movement of the mouse 6 (stepA215). It is determined whether or not the mouse 6 has been clicked(step A216) and if the mouse 6 has been clicked, processing is executedin accordance with a cursor position in the fixed form mail “A” screenimage of FIG. 24A.

It is determined whether or not a cursor position is a position in thesubject area (step A217) and if the cursor position is this position, acharacter cursor is set at the subject area (step A218). If a cursorposition is not a position in the subject area, it is determined whetheror not the cursor position is a position in the text area (step A219)and if the cursor position is this position, a character cursor is setat the text are (step A220). If a cursor position is not a position inthe text area either, it is determined whether or not the cursorposition is a password switch position on the screen image (step A221).If the cursor position is this, a password flag PSF is inverted (stepA222).

If the cursor position is not the password switch position either, it isdetermined whether or not the cursor position is an OK switch position(step A223) and if the cursor position is this position, a fixed formmail screen image is cleared (step A224) and program flow is returned toa flow of FIG. 17.

If a cursor position is not the OK switch position, it is determinedwhether or not the cursor position is a cancel switch position (stepA225) and if the cursor position is this position, a password data of amail buffer is cleared and simultaneously a fixed form mail screen imageis cleared (step A226). Program flow is returned to the flow of FIG. 17.If a position when the mouse 6 is clicked is not one of the abovementioned positions, program flow goes to step A241 and a movement ofthe mouse 6 is checked.

At step A216 of FIG. 20, if the mouse 6 has not been clicked, it isdetermined whether or not data input has been made from the keyboard 4in FIG. 21 (step A227). If the data input has been made, it isdetermined whether or nor a character cursor position is in a subjectarea (step A228). If the cursor position is not this position, it isdetermined whether or not a character cursor position is in a text area(step A229).

At step A228, if a character cursor position is the subject area, datainput to the subject area is displayed (step A230) and the data arestored by inputting to the subject area of a buffer of RAM 3 (stepA231). For example, as shown in FIG. 24A, a subject data of “matter ofabsence” is displayed. On the other hand, if a character cursor positionis in the text area at step A229, data input to the text area aredisplayed (step A232) and the data are stored in the text area of abuffer of RAM 3 by inputting (step A233). For example, as shown in FIG.24A, a text data including an absent period and a password is displayed.

At step A231 or step A233, after the data are stored, the charactercursor is moved (step A234). Then, it is determined whether or not thepassword flag PSF is “1” (step A235) and if the flag is “1”, an inputcharacter display is reversed (step A236) and input data are stored in apassword area (step A237). Program flow goes to step A214 of FIG. 20 anda movement of the mouse 6 is checked. At step A227, if the data are notinput, if a character cursor position is neither the subject area atstep A228 nor the text area at step A229, or if PSF is “0” at step A235,program flow goes to step A214 of FIG. 20 and a movement of the mouse 6is checked.

FIGS. 22 and 23 are flows of the fixed form mail “B” creation processingat step A194 of FIG. 17 and FIG. 24B is a display screen image of afixed form mail “B”. An electronic mail of FIG. 24A does not indicate anemergency contact place in an absent period through the mail indicatesthe absent period. While an OK switch and a cancel switch are providedin the screen image, a password switch is not provided, which isdifferent from a fixed form mail “A”.

In FIG. 22, a transmitter address is set as a self-address (step A240).Then, a fixed form mail creation frame screen image is displayed (stepA241), a cursor for the mouse 6 is displayed (step A242) and a charactercursor is displayed in a subject area (step A243).

Then, it is determined whether or not the mouse 6 has been moved (stepA244) and if the mouse 6 has been moved, a cursor position on the screenimage is moved in accordance with the movement of the mouse 6 (stepA245). It is determined whether or not the mouse 6 has been clicked(step A246) and if the mouse 6 has been clicked, processing is executedin accordance with a cursor position in the fixed form mail “B” screenimage of FIG. 24B.

It is determined whether or not a cursor position is a position in thesubject area (step A247) and if the cursor position is this position, acharacter cursor is set at the matter area (step A248). If a cursorposition is not in the subject area, it is determined whether or not thecursor position is a text area (step A249) and if the cursor position isthis position, a character cursor is set at the text area (step A250).If a cursor position is not a position in the text area either, it isdetermined whether or not the cursor position is an OK switch position(step A251) and if the cursor position is this position, the fixed formmail screen image is cleared (step A252) and program flow is returned tothe flow of FIG. 17.

If a cursor position is not the OK switch position, it is determinedwhether or not the cursor position is a cancel switch position (stepA253) and if the cursor position is this position, not only is data of amail buffer cleared but a fixed form mail screen image is cleared (stepA254). Then program flow is returned to the flow of FIG. 17. If aposition of the mouse 6 when it is clicked is not any one of the abovementioned positions, program flow goes to step A244 and a movement ofthe mouse 6 is checked.

At step A246 of FIG. 22, if the mouse 6 has not been clicked, it isdetermined whether or not data input has been made from the keyboard 4in FIG. 23 (step A255). If the data input has been made, it isdetermined whether or not a character cursor position is in a subjectarea (step A256). If the character cursor position is not this position,it is determined whether or not the character cursor position is in atext area (step A257).

At step A256, if a character cursor position is in the subject area,data input in the subject area is displayed (step A258) and the data areinput to and stored in a subject area of a buffer of RAM 3 (step A259).For example, as shown in FIG. 24B, a subject data of “matter ofemergency contact place” is displayed. On the other hand, at step A257,if a character cursor position is in a text area, data input to the textarea are displayed (step A260) and the data are input to and stored in atext area of the buffer of RAM 3 (step A261). For example, as shown inFIG. 24B, a text data including a telephone number of the emergencycontact place and the like is displayed.

At step A259 or step A261, after the data are stored, the charactercursor is moved (step A262). Then program flow goes to step A244 of FIG.22 and a movement of the mouse 6 is checked. At step A255, if the dataare not input or if the character cursor is neither in the subject areaat step A256 nor in the text area in step A257, program flow goes tostep A244 of FIG. 22 and a movement of the mouse 6 is checked.

FIGS. 25 and 26 are flows of timer interrupt processing. The timerinterrupt processing in the first embodiment and the other embodimentsare reception processing of an electronic mail.

When timer interrupts occur at set intervals, the server 300 shown inFIG. 1 is accessed by CPU 1 of a terminal 100. In FIG. 25, it isdetermined whether or not a received mail is present in a mailbox of theserver 300 (step A270). If the received mail is not present, the flow isimmediately terminated. IF the received mail is present, a pointer “n”indicating an area number of the MAIL(n) of the received mail storagearea 33 of RAM 3 shown in FIG. 2 is set at “1” (step A271). Then, it isdetermined whether or not an area of a MAIL(n) designated by “n” isempty (step A272).

If a designated area is not empty, “n” is incremented (step A273) and itis determined whether or not “n” exceeds the maximum number (step A274).If “n” has not exceeded the maximum number, program flow goes to stepA272 and it is determined whether or not the received mail “n” area isempty. A loop of steps A272, A273 and A274 is repeated while “n” isincremented to search an empty RECEIVED MAIL(n) area. At step A274, if“n” exceeds the maximum number, that is when none of the received mailarea of the received mail storage area 33 of RAM 3 is empty, a receivedmail with the oldest reception data and time is searched (step A275).Then, the pointer “n” is set at a mail number thereof (step A276).

At step A272, if the designated RECEIVED MAIL(n) area is empty or if “n”is set at the mail number with the oldest reception date and time atstep A276, a received mail fetched from the server 300 is stored in thereceived mail (n) area (step A277). Then, the unseal flag KAIFUF(n) isreset at “0” to indicate the seal state (step A278) and TIME(n) is setat a reception date and time (step A279).

Then, it is determined whether or not the definite flag KAKUTEIF set inthe absence setting processing of FIG. 17 is “1” (step A280). If theflag is “0”, the flow is terminated. If the flag is “1”, it isdetermined whether or not the reception date and time set to TIME(n) isin a period of a start date and time to an end date and time (stepA281). If the reception date and time is not in the period, the flow isterminated, but when the reception date and time is in the period, apointer “k” is set at “1” (step A282). The pointer “k” is the number ofa TAIKI ADD(k) of the waiting address area 36 of RAM 3.

Then, it is determined whether or not an address of a RECEIVED MAIL(n)coincides with the TAIKI ADD(k) designated by “k” (step A283). If thereis no coincidence therebetween, “k” is incremented (step A284) and it isdetermined whether or not “k” exceeds the maximum number (step A285). If“k” has not exceeded the maximum number, program flow does to step A283and it is determined whether or not the address of a MAIL(n) coincideswith an address designated by the waiting address area. Then, a loop ofsteps A283, A284 and A285 is repeated while “k” is incremented to searchan address in coincidence.

At step A285, if “k” exceeds the maximum number, that is, when there isnot present any address in coincidence, an address of a MAIL(n) is setas a receiver address of a fixed form mail “A” (step A286). Then, thefixed form mail “A” is transmitted (step A287) and it is determinedwhether or not the transmission has been completed (step A288). If thetransmission has not been completed, transmission processing of stepA287 is continued. If the transmission has been completed, “k” is set at“1” (step A289).

Then, it is determined whether or not the TAIKI ADD(k) area is empty(step A290) and if the area is empty, an address of a RECEIVED MAIL(n)corresponding to a transmitted fixed form mail “A” is stored in theTAIKI ADD(k) area (step A291). Then program flow is returned to the mainroutine flow of FIG. 3.

At step A290, if the TAIKI ADD(k) area is not empty, “k” is incremented(step A292) and it is determined whether or not “k” is the maximumnumber (step A293). If “k” is equal to or less than the maximum number,program flow goes to step A290 and it is determined whether or not theTAIKI ADD(k) area is empty. Then a loop of steps A290, A292 and A293 isrepeated while “k” is incremented to search the TAIKI ADD(k) with anempty space. At step A293, if “k” exceeds the maximum number, that is noempty space if available, program flow is returned to the main routineflow of FIG. 3.

At step A283, if an address of a RECEIVED MAIL(n) coincides with adesignated address of a waiting address area, it is determined whetheror not a password is present in a text of the RECEIVED MAIL(n) (stepA294). If the password is not available, program flow is returned to themain routine of FIG. 3. If the password is available, a receiver addressof a fixed form mail “B” is set as an address of a RECEIVED MAIL(n)(step A295). Then, the fixed form mail “B” is transmitted (step A296)and it is determined whether or not the transmission has been completed(step A297). If the transmission has not been completed, thetransmission processing of step A296 is continued. If the transmissionhas been completed, the TAIKI ADD(k) is erased (step A298). In addition,the RECEIVED MAIL(n) is erased (step A299) and the received mail area ofRAM 3 is sorted (step A300). Then, program flow is returned to the mainroutine of FIG. 3.

As described above, according to the first embodiment, the terminal 100shown in FIG. 1 comprises:

mail receiving means for receiving an electronic mail;

absence mode setting means for setting an absence mode indicating thestate of absence of a receiver of the electronic mail;

mail transmitting means for transmitting a predetermined fixed form mailresponding to a first electronic mail received by the mail receivingmeans in the absence mode; and

control means for making the mail transmitting means to transmit aspecific fixed form mail when the control means determines that a secondelectronic mail from a receiver responding to the predetermined fixedform mail satisfies a specific condition.

If the response mail to the fixed form mail responding to the electronicmail received in the absence satisfies the specific condition, thespecific fixed form mail is transmitted.

In the above mentioned first embodiment, there is described anelectronic mail system in which a program to receive and transmitelectronic mails is stored in ROM 2, but such constitutions may beadopted that a program to execute electronic mail processing is storedin such media as a floppy disk, a compact disk and the like and anapparatus such as a personal computer or a word processor for generalpurpose use of the like executes the program.

The machine readable storage medium stores a program for electronic mailprocessing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of setting an absence mode indicating the state of absence ofa receiver of the electronic mail;

(iii) step of transmitting a predetermined fixed form mail responding toa first electronic mail received by the step (i) in the absence mode;

(iv) step of determining whether or not a second electronic mail from areceiver responding to the predetermined fixed form mail satisfies aspecific condition; and

(v) step of transmitting a specific fixed form mail when the step (iv)determines that the specific condition is satisfied.

The program is executed by an apparatus such as a personal computer or aword processor for general purpose use, or the like.

Other embodiments of the electronic mail system according to the presentinvention will be described. The same portions as those of the firstembodiment will be indicated in the same reference numerals and theirdetailed description will be omitted.

The second embodiment will be described. FIG. 27 shows a constitution ofa data area of RAM 3, that is a memory map, in the second embodiment. Inthe figure, while a mail creation area, an address area, a received mailarea, a start date and time, an end date and time a flag KAKUTEIF, aregister “A” and an ON flag ONF are the same as those in the firstembodiment, the other areas are different from those in the firstembodiment. In the fixed form mail area, a single kind of fixed formmail is stored. The fixed form mail is the same as the fixed form mail“A” shown in FIG. 24A in the first embodiment. In other words, in thecase of emergency, a fixed form mail requesting for a response mailincluding a password is included. Besides, in RAM 3, there are providedan area to store a transfer address and areas of TAIKI MAIL(1) to TAIKIMAIL(L) to store a plurality of waiting mails. In the case where a fixedform mail is transmitted to the other party of a received mail requiringa response, the waiting mail means the received mail.

Then, while operations of the second embodiment will be described,description on the duplicate operations of those in the first embodimentis omitted. Operations of the second embodiment different from those ofthe first embodiment are those in absence setting processing and timerinterrupt processing (reception processing).

FIGS. 28 and 29 are flows of absence setting processing in the secondembodiment and FIG. 30 is an absence setting processing screen image.

In FIG. 28, a time setting screen image is displayed in the absencesetting processing screen image of FIG. 30 (step B1), a character cursoris set at a start date and time area (step B2). A cursor for the mouse 6is displayed (step B3). It is determined whether or not the mouse 6 hasbeen moved (step B4) and if the mouse 6 has been moved, the cursor ismoved in accordance with the movement of the mouse 6 (step B5). Then itis determined whether or not the mouse 6 has been clicked (step B6). Ifthe mouse 6 has been clicked, it is determined whether or not a cursorposition is in a start date and time area (step B7). If the cursorposition is this position, a character cursor is set at the start dateand time area (step B8).

If the cursor position is not in the start date and time area, it isdetermined whether or not the cursor position is in an end date and timearea (step B9). If the cursor position is this position, a charactercursor is set at the end date and time area (step B10). If the cursorposition is not in the end date and time area, it is decided whether ornot the cursor position is a mail creation switch position (step B11).If the cursor position is this position, fixed form mail creationprocessing is executed (step B12). The fixed form mail creationprocessing is the same as the flow of the first embodiment shown inFIGS. 20 and 21 and the fixed form mail shown in FIG. 24A is created.After the fixed form mail creation processing, a content of a mailbuffer is stored in the fixed form mail area of RAM 3 (step B13).

At step B11, if the cursor position is not the mail creation switch, itis determined whether or not the cursor position is a transfer addressinput switch position on the screen image of FIG. 30 (step B14). If thecursor position is this position, transfer address input processing isexecuted (step B15). The transfer address input processing would befurther described later. At step B14, if the cursor position is not thetransfer address input switch position, it is determined whether or notthe cursor position is an OK switch position (step B16). If the cursorposition is this position, the absence setting processing screen imageof FIG. 30 is cleared and the definite flag KAKUTEIF is set at “1” (stepB17). Then the flow is terminated.

At step B16, if the cursor is not the OK switch position, it isdetermined whether or not the cursor position is a cancel switchposition (step B18). If the cursor position is this position, data inthe mail area, and date and time area are cleared, the absence settingprocessing screen image of FIG. 30 is cleared and the definite flagKAKUTEIF is set at “0” (step B20). Then the flow is terminated.

At step B18, if the cursor position is not the cancel switch position,that is, if the cursor position is not any one of the above mentionedpositions, or after processing corresponding to a cursor position iscompleted, program flow goes to step B4 and a movement of the mouse 6 ischecked.

At step B6, if the mouse has not been clicked, program flow goes to aflow of FIG. 29 and it is determined whether or not data input is madefrom the key board 4 (step B21). If the data input has been made, it isdetermined whether or not a character cursor position is in the startdate and time area (step B22). If the character cursor position is thisposition, the data of the start date and time input to the start dateand time area are displayed (step B23) and the data of the start dateand time are stored in RAM 3 (step B24). Then, the character cursor ismoved (step B25).

At step B22, if the character cursor position is not the start date andtime position, it is determined whether or not the character cursorposition is an end date and time position (step B26). If the charactercursor position is this position, the data of the end date and timeinput to the end date and time area are displayed (step B27) and thedata of the end date and time are stored in RAM 3 (step B28). Then, thecharacter cursor is moved (step B28).

After the character cursor is moved at step B25, or if the data input isnot made at step B21 or if the character cursor position is not any oneof the start date and time, and the end date and time positions, programflow goes to step B24 of FIG. 28 and a movement of the mouse 6 ischecked.

FIGS. 31 to 33 are flows of transfer address input processing at stepB15 of FIG. 28 and FIG. 34 is the transfer address input screen image.In the screen image, an address-input area, a type input area, and inaddition an OK switch and a cancel switch are displayed.

In FIG. 31, a transfer address input screen image of FIG. 34 isdisplayed (step B30) and a cursor is displayed (step B31). Then acharacter cursor is displayed in the address-input area (step B32).Then, it is determined whether the mouse 6 is moved (step B33).

When the mouse 6 is moved, a cursor position is moved (step B34). Then,it is determined whether or not the mouse 6 is clicked (step B35). Ifthe mouse 6 is clicked, a cursor position on the clicking is checked. Itis determined whether or not a cursor position is an OK switch position(step B36). If the cursor position is this position, an address input inthe screen is stored in the transfer address area shown in FIG. 27 (stepB37). Then, the display is cleared (step B38) and the flow isterminated. At step B36, if a cursor position is not the OK switchposition, it is determined whether or not the cursor position is acancel switch position (step B39). If the cursor position is thisposition, the display is cleared (step B38) and the flow is terminated.

At step B39, if a cursor position is not the cancel switch position, itis determined whether or not the cursor position is a position in theaddress input area in a flow of FIG. 32 (step B40). If the cursorposition is this position, a character cursor is set at theaddress-input area (step B41). At step B40, if a cursor position is notthe address-input area, it is determined whether or not the cursorposition is a position in the type-input area (step B42). If the cursorposition is this position, a character cursor is set at the type-inputarea (step B43). After the character cursor is moved, program flow goesto step B33 of FIG. 31 and a movement of the mouse 6 is checked.

At step B35 of FIG. 31, if the mouse 6 has not been clicked, it isdetermined whether or not data input has been made from the keyboard 4in a flow of FIG. 33 (step B44). If the data input has been made, it isdetermined whether or not a character cursor position is a position inthe address-input area (step B45). IF the character cursor position isan address-input position, data input in the address input area aredisplayed (step B46). Then, the character cursor is moved for next datainput (step B47).

At step B45, if a character cursor position is not the address inputposition, it is determined the character cursor position is in a typeinput area (step B48). If the character cursor position is a position inthe type-input area, data input to the type input area is displayed(step B49). Then, the character cursor is moved for a next data input(step B47). After the character cursor is moved, or if the charactercursor position is not in any one of the address input area and the typeinput area, program flow goes to step B33 of FIG. 31 and a movement ofthe mouse 6 is checked.

FIGS. 35 to 37 are flowcharts of timer interrupt processing (receptionprocessing).

When timer interrupts occur at set intervals, the server 300 shown inFIG. 1 is accessed by CPU 1 of a terminal 100. In FIG. 35, it isdetermined whether or not a received mail is present in a mailbox of theserver 300 (step B50). If a received mail is not present, the flow isimmediately terminated. If a received mail is present, a pointer “n”indicating an area number of the MAIL(1) to MAIL(N) of the received mailstorage area of RAM 3 shown in FIG. 27 is set at “1” (step B51). Then,it is determined whether or not an area of a RECEIVED MAIL (n)designated by “n” is empty (step B52).

If a designated area is not empty, “n” is incremented (step B53) and itis determined whether or not “n” exceeds the maximum number (step B54).If has not exceeded the maximum number, program flow goes to step B52and it is determined whether or not the RECEIVED MAIL(n) area is empty.A loop of steps B52, B53 and B54 is repeated while “n” is incremented tosearch a RECEIVED MAIL(n) area with an empty space. At step B54, if “n”exceeds the maximum number, that is when none of the MAIL(1) to MAIL(N)of the received mail storage area of RAM 3 is empty, a received mailwith the oldest reception data and time is searched (step B55). Then,the pointer “n” is set at a mail number thereof (step B56).

At step B52, if the designated RECEIVED MAIL(n) area is empty or at stepB56 when “n” is set at the mail number with the oldest reception dateand time, a received mail fetched from the server 300 is stored in theRECEIVED MAIL(n) area (step B57). Then, the unseal flag KAIFUF(n) isreset at “0” so as to indicate the seal state (step B58) and TIME(n) isset at a reception date and time (step B59).

Then, it is determined whether or not the definite flag KAKUTEIF set inthe absence setting processing of FIG. 28 is “1” (step B60). If the flagis “0” , the flow is terminated since the absence setting is not made.If the flag is “1” (absence setting), it is determined whether or notthe reception date and time set to TIME(n) is in a period of a startdate and time to an end date and time (step B61). If the reception dateand time is not in the period, the flow is terminated, but when thereception date and time is in the period, it means that a mail isreceived in the absent period. In this case, a pointer “k” is set at “1”(step B62). The pointer “k” is a number of the TAIKI MAIL(1) to TAIKIMAIL(L) in the waiting mail area of RAM 3 shown in FIG. 27.

Then, it is determined whether or not an address of a RECEIVED MAIL(n)coincides with the TAIKI MAIL(k) designated by “k” (step B63). If thereis no coincidence therebetween, “k” is incremented (step B64) and it isdetermined whether or not “k” exceeds the maximum number (step B65). If“k” has not exceeded the maximum number, program flow goes to step B63and it is determined whether or not the transmitter address of aRECEIVED MAIL(n) coincides with an address of a waiting mail with adesignated waiting mail are. Then, a loop of steps B63, B64 and B65 isrepeated while “k” is incremented to search an address in coincidence.

At step B65, if “k” exceeds the maximum number, that is when there isnot present any waiting mail in coincidence, a transmitter address ofthe RECEIVED MAIL(n) is designated as a receiver address of a fixed formmail (step B66). Then the same fixed form mail as that in the firstembodiment shown in FIG. 24A is transmitted (step B67) and it isdetermined whether or not the transmission has been completed (stepB68). If the transmission has not been completed, transmissionprocessing of step B67 is continued, “k” is set a “1” (step B69).

Then, it is determined whether or not a TAIKI MAIL(k) area is empty(step B70) and if the area is empty, a RECEIVED MAIL(n) corresponding toa transmitted fixed form mail is stored in the TAIKI MAIL(k) area (stepB71). Then, the flow is terminated. That is, if a RECEIVED MAIL(n) torequire a response is received and when a fixed form mail has beentransmitted to the other party transmitting the received mail, theRECEIVED MAIL(n) is stored in the TAIKI MAIL(k) area as a waiting mail.

At step B70, if the TAIKI MAIL(k) area is not empty, “k” is incremented(step B72) and it is determined whether or not “k” is the maximum number(step B73). If “k” is equal to or less than the maximum number, programflow goes to step B70 and it is determined whether or not the TAIKIMAIL(k) area is empty. Then a loop of steps B70, B72 and B73 is repeatedwhile “k” is incremented to search a TAIKI MAIL(k) area with an emptyspace. At step B73, if “k” exceeds the maximum number, that is when anempty space is not available, the flow is terminated.

At step B73, if an address of a RECEIVED MAIL(n) coincides with adesignated address of a waiting mail of the TAIKI MAIL(k) area, it isdetermined whether or not a password is present in a text of theRECEIVED MAIL(n) (step B74). If a password is not present, program flowis returned to the main routine. If a password is present, transfer mailcreation processing is executed (step B75). Then, a created transfermail is transmitted (step B76) and it is determined whether or not thetransmission has been completed (step B77). If the transmission has notbeen completed, the transmission processing of step B76 is continued. Ifthe transmission has been completed, a waiting mail in the TAIKI MAIL(k)area is erased (step B78). Then, the RECEIVED MAIL(n) is erased (stepB79) and the receive mail area of RAM 3 is sorted (step B80). Then,program flow is returned to the main routine.

FIG. 37 is a flow of transfer mail creation processing at step B75 ofFIG. 36. In the processing, an address of a transfer mail is stored inan address area of the mail creation area (step B81). Then, a subject ofa TAIKI MAIL(k) area is stored in a subject input area of the mailcreation area (step B82). Then, a text in the TAIKI MAIL(k) area isstored in a text input area of the mail creation area (step B83). Then,program flow goes to step B76 of FIG. 36 and a created transfer mail istransmitted. As an address of a transfer mail, there is considered mailaddresses of a portable terminal carried by a receiver on the road, apersonal computer in home use of the same receiver and the like.

According to the second embodiment, the terminal 100 of FIG. 1comprises:

mail receiving means for receiving an electronic mail;

absence mode setting means for setting an absence mode indicating thestate of absence of a receiver of the electronic mail;

mail transmitting means for transmitting a predetermined fixed form mailresponding to a first electronic mail received by the mail receivingmeans in the absence mode; and

mail transfer means for making the mail transmitting means to transferthe first electronic mail to a predetermined address when the mailtransfer means determines that a second electronic mail satisfies aspecific condition when the mail receiving means receives the secondelectronic mail responding to the predetermined fixed form mail from areceiver of thereof.

If a response mail received from the other party in response to thefixed form mail transmitted in response to the electronic mail receivedin the absence satisfies the specific condition, the electronic mailreceived for the first time in this communication is transferred to thedesignated address of the same electronic mail.

In the above mentioned second embodiment, there is described anelectronic mail system in which a program to receive and transmitelectronic mails is stored in ROM 2, but such constitutions may beadopted that a program to transmit or receive an electronic mail isstored in such media as a floppy disk, a compact disk and the like andan apparatus such as a personal computer or a word processor for generalpurpose use or the like executes the program.

The machine readable storage medium stores a program for electronic mailprocessing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of setting an absence mode indicating the state of absence ofa receiver of the electronic mail;

(iii) step of transmitting a predetermined fixed form mail responding toa first electronic mail received by the step (i) in the absence mode;and

(iv) step of making the step (iii) to transfer the first electronic mailto a predetermined address when the step (iv) determines that a secondelectronic mail satisfies a specific condition when the step (i)receives the second electronic mail responding to the predeterminedfixed form mail from a receiver of thereof.

An apparatus such as a personal computer or a word processor forgeneral-purpose use, or the like executes the program.

The third embodiment will be described. FIG. 38 shows a constitution ofdata area of RAM 3, that is a memory map, in the third embodiment. Inthis figure, the followings are the same as those of the firstembodiment: a mail creation area, an address area, a received mail area,a fixed form mail “A” area, a fixed form mail “B” area, a start date andtime and an end date and time in an absent period, an absence settingflag KAKUTEIF, a register “A” and an ON flag ONF. In addition, in thethird embodiment, an area of a flag ALLF is provided. The function ofthe flag is described later.

Then, while operations of the third embodiment will be described,description on the duplicate operations of those in the first embodimentis omitted. Operations of the third embodiment different from those ofthe first embodiment are those in absence setting processing, addressdesignation processing and timer interrupt processing (receptionprocessing).

FIGS. 39 and 40 are flows of absence setting processing and FIG. 41 isan absence setting screen image. In FIG. 39, a time setting screen imageis displayed in the absence setting screen image of FIG. 41 (step C1), acharacter cursor is set at the start date and time area (step C2). Then,a cursor for the mouse 6 is displayed (step C3) Then it is determinedwhether or not the mouse 6 has been moved (step C4) and if the mouse 6has been moved, the cursor is moved in accordance with the movement ofthe mouse 6 (step C5). Then, it is determined whether or not the mouse 6has been clicked (step C6). If the mouse 6 has been clicked, it isdetermined whether or not a cursor position is in the start data andtime area (step C7). If the cursor position is this position, acharacter cursor is set at the start date and time area (step C8).

If a cursor position is not in the start date and time area, it isdetermined whether or not the cursor positions is in the end date andtime area (step C9). If the cursor position is this position, acharacter cursor is set at the end date and time area (step C10). If acursor position is not in the end date and time area, it is determinedwhether or not the cursor position is a small “A” creation switchposition (step C11). If the cursor position is this position, fixed formmail creation processing is executed (step C12). The fixed form mailcreation processing is further described later. Then, a content of amail buffer is stored in the fixed form mail “A” area of RAM 3 (stepC13).

At step C11, if a cursor position is not the mail “A” creation switchposition, it is determined whether or not the cursor position is a mail“B” creation switch position (step C14). If the cursor position is thisposition, then also the same fixed form mail creation processing as stepC12 is executed (step C15). Then, a content of a mail buffer is storedin the fixed form mail “B” area of RAM 3 (step C16).

At step C14, if a cursor position is not the mail “B” creation switchposition, it is determined whether or not the cursor position is an OKswitch position (step C17). If the cursor position is this position, anabsence setting screen image of FIG. 41 is cleared and the definite flagKAKUTEIF is set at “1” (step C18). Then, the flow is terminated.

At step C17, if a cursor position is not the OK switch position, it isdetermined whether or not the cursor position is a cancel switchposition (step C19). If the cursor position is this position, data ofdate and time area of the fixed form mail “A” and fixed form mail “B”are cleared (step C20) and the absence setting processing screen imageof FIG. 19 is cleared and the definite flag KAKUTEIF is reset at “0”(step C21). Then, the low is terminated.

At step C19, if a cursor position is not the cancel position, it isdetermined whether or not the cursor position is an address designatingswitch position on the screen image of FIG. 41 (step C22). If the cursorposition is this position, address-designating processing is executed(step C23). The address designating processing is further describedlater.

If a cursor position is not any one of the above mentioned positions, orafter processing corresponding to a cursor position is completed,program flow goes to step C4 and a movement of the mouse 6 is checked.

At step C6, if the mouse 6 has not been clicked, program flow goes to aflow of FIG. 40 and it is determined whether or not data input has beenmade from the key board 4 (step C24). If the data input has been made,it is determined whether or not a character cursor position is in astart date and time area (step C25). If the character cursor position isthis position, the data of the start date and time input in the startdate and time area are displayed (step C26) and the data of the startdate and time are stored in RAM 3 (step C27). Then, the character cursoris moved (step C28).

At step C25, if a character cursor position is not the start date andtime position, it is determined whether or not the character cursorposition is an end date and time position (step C29). If the charactercursor position is this position, data of the end date and time input tothe end date and time area are displayed (step C30) and the data of theend date and time are stored in RAM 3 (step C31). Then, the charactercursor is moved (step C28).

After the character cursor is moved in step C28, or if the data input isnot made in step C24 or if the character cursor position is not at anyone of the start date and time, and the end date and time positions,program flow goes to step C4 of FIG. 39 and a movement of the mouse 6 ischecked.

FIG. 42 is a flow of address designation processing at step C23 of FIG.39 and FIG. 43 is an address list display screen image on designatingthe address.

In FIG. 42, the address flags ADDF(1) to ADDF(M) of each address in theaddress area of RAM 3 are all set at “0” (step C32) and a screen imageof address list frame is displayed (step C33). Then, a pointer “m”indicating an address number is set at “1” (step C34) and an ADDRESS(m)designated by “m” is displayed (step C35). Then, “m” is incremented(step C36) and it is determined whether or not “m” exceeds the maximumnumber (step C37). If “m” is equal to or less than the maximum number,program flow goes to step C35 to display data of the ADDRESS(m). Then, aloop of steps C35, C36 and C37 is repeated while “m” is incremented till“m” exceeds the maximum number. Then, all the data of addresses aredisplayed.

At step C37, if “m” exceeds the maximum number, a cursor is displayed onthe screen image (step C38) and it is determined whether or not themouse has been moved (step C39). If the mouse has been moved, a cursorposition is moved in accordance with the movement (step C40). Then, itis determined whether or not the mouse 6 has been clicked (step C41) andif the mouse 6 has not been clicked, program flow goes to step C39 andthe movement of the mouse 6 is checked.

If the mouse 6 has been clicked, it is determined whether or not acursor position is an address list position on the screen image of FIG.43 (step C42). If the cursor position is this position, a register “A”is set at an address number of the cursor position (step C43). Then, anaddress “A” is displayed in reverse (step C44) and the flag ADDF(A) isinverted (step C45). Then, program flow goes to step C39 and a movementof the mouse 6 is checked.

At step C42, if a cursor position is not the address list position, itis determined whether or not a cursor position is an OK switch positionon the screen image of FIG. 43 (step C46). If the cursor position isthis position, a screen image of FIG. 43 is cleared (step C47) and theflow is terminated and it is determined whether or not the mouse 6 ismoved on the screen image of FIG. 41 (step C4 of FIG. 39).

At step C46, if a cursor position is not the OK switch position, it isdetermined whether or not the cursor position is a cancel switchposition (step C48). If the cursor position is this position, the flagsADDF(1) to ADDF(M) are all reset at “0” (step C49) and a screen image ofFIG. 43 is cleared (step C47) and the flow is terminated and a movementof the mouse 6 is checked (step C4 of FIG. 39).

At step C48, if a cursor position is not the cancel switch position, itis determined whether or not the cursor position is an ALL switchposition on the screen image of FIG. 43 (step C50). If the cursorposition is this position, the flag ALLF is inverted (step C51).

If a cursor position when the mouse 6 is clicked is not any one of theabove mentioned positions, or after a processing according to eachcursor position has been completed, program flow goes to step C39 and amovement of the mouse 6 is checked.

FIG. 44 is a flow of fixed form mail creation processing at steps C12and C15 of FIG. 39. FIG. 45A is a screen image of the fixed form mail“A” clearly indicating only an absent period and FIG. 45B is a screenimage of the fixed form mail “B” clearly indicating not only an absentperiod but an emergency contact place in the absent period.

In FIG. 44, a screen image of a fixed form mail creation frame isdisplayed (step C52). Then a cursor for the mouse 6 is displayed (stepC53) and a character cursor is displayed in the subject area (step C54).

Then, it is determined whether or not the mouse 6 has been moved (stepC55) and if the mouse 6 has been moved, a cursor position on the screenimage is moved in accordance with the movement of the mouse 6 (stepC56). Then, it is determined whether or not the mouse 6 has been clicked(step C57) and if the mouse 6 has been clicked, processing executed inaccordance with a cursor position on a fixed form mail “A” screen imageof FIG. 45A or a cursor position on a fixed form mail “B” screen imageof FIG. 45B.

It is determined whether or not a cursor position is a position in thesubject area (step C58) and if the cursor position is this position, acharacter cursor is set at the subject area (step C59). If a cursorposition is not a position in the subject area, it is determined whetheror not the cursor position is a position in the text area (step C60) andif the cursor position is this position, a character cursor is set atthe text area (step C61). If a cursor position is not a position in thetext area either, it is determined whether or not the cursor position isan OK switch position on the screen image (step C62) and if the cursorposition is this position, a fixed form mail screen image is cleared(step C63) and the flow is terminated.

If a cursor position is not the OK switch position, it is determinedwhether or not the cursor position is a cancel switch position (stepC64) and if the cursor position is this position, not only are data of afixed form mail creation area cleared but a fixed form mail screen imageis cleared (step C65). Then, the flow is terminated.

At step C57 of FIG. 44, if the mouse 6 has not been clicked, it isdetermined whether or not data input has been made from the key board 4(step C66). If the data input has been made, it is determined whether ornot a cursor position is in a subject area (step C67). If the cursorposition is this position, data input in the subject area are displayed(step C68) and the data is stored in a subject area of a buffer of RAM 3(step C69). Then, the character cursor is moved (step C70).

At step C67, if a character cursor position is not in the subject area,it is determined whether or not the character cursor position is in atext area (step C71). If the character cursor position is this position,data signal in the text area are displayed (step C72) and the data arestored in a text area of a buffer of RAM 3 (step C73). Then, thecharacter cursor is moved (step C70).

At step C64, if a cursor position is not the cancel switch position,that is when a cursor position is not at any positions which are objectsto be processed, if the data input is not made at step C66, if acharacter cursor position is not the text area or after the charactercursor is moved at step C70, program flow goes to step C55 and amovement of the mouse 6 is checked.

FIGS. 46 and 47 are flows of timers interrupt processing.

When timer interrupts occur at set intervals, the server 300 shown inFIG. 1 is accessed by CPU 1 of a terminal 100. In FIG. 46, it isdetermined whether or not a received mail is present in a mail box ofthe server 300 (step C74). If the received mail is not present, the flowis immediately terminated. If the received mail is present, a pointer“n” indicating the number of a RECEIVED MAIL(n) area indicated by theMAIL(n) of the received mail storage area of RAM 3 is set at “1” (stepC75). Then, it is determined whether or not a RECEIVED MAIL(n) areadesignated by “n” is empty (step C76).

If a designated area is not empty, “n” is incremented (step C77) and itis determined whether or not “n” exceeds the maximum number (step C78).If “n” has not exceeds the maximum number, program flow goes to step C76and it is determined whether or not the RECEIVED MAIL(n) area is empty.A loop of steps C76, C77 and C78 is repeated while “n” is incremented tosearch a RECEIVED MAIL(n) area with an empty space. At step C79, if “n”exceeds the maximum number, that is when none of the area of theRECEIVED MAIL(1) to MAIL(M) of the received mail storage area of RAM 3is empty, a received mail with the oldest reception data and time issearched (step C79). Then, the pointer “n” is set at a mail numberthereof (step C80).

At step C76, if the designated RECEIVED MAIL(n) area is empty or at stepC80 when “n” is set at the mail number with the oldest reception dataand time, a received mail fetched from the server 300 is stored in theRECEIVED MAIL(n) area (step C81), Then, an unseal flag KAIFUF(n) isreset at “0” to indicate the seal state (step C82) and TIME(n) is set ata reception date and time (step C83).

Then, it is determined whether or not the definite flag KAKUTEIF set inthe absence setting processing of FIG. 39 is “1” (step C84). If the flagis “0”, the flow is terminated. If the flag is “1”, it is determinedwhether or not the reception date and time set to TIME(n) is in a periodof a start date and time to an end date and time in the absence (stepC85). If the reception date and time is not in the period, the flow isterminated, but when the reception date and time is in the period, it isdetermined whether or not the flag ALLF is “1”, that is it is determinedwhether or not all the addresses are designated in the address area ofRAM 3 (step C86).

If all the addresses are designated, a pointer “m” indicating an addressnumber of the address area is set 1 (step C87). Then, it is determinedwhether or not a transmitter address of a RECEIVED MAIL(n) and anADDRESS(m) designated by “m” coincide with each other (step C88). Ifthere is no coincidence therebetween, “m” is incremented (step C89) andit is determined whether or not “m” exceeds the maximum number (stepC90). If “m” does not exceed the maximum number, program flow goes tostep C88 and it is determined whether or not a transmitter address ofthe RECEIVED MAIL(n) and a designated ADDRESS(m) of the address areacoincide with each other and a loop of steps C88, C89 and C90 isrepeated while “m” is incremented to search an address in coincidence.

At step C86, if the ALLF is “0”, a pointer “m” is set at “1” in a flowof FIG. 47 (step C91) and it is determined whether or not the designatedflag ADDF(m) is 1, that it is determined whether or not the designatedflag ADDF(m) is a designated address (step C92). If the flag is “0”, “m”is incremented, a next address is designated (step C93) and it isdetermined whether or not “m” exceeds the maximum number (step C94). If“m” has not exceeded the maximum number, program flow goes to step C92and it is determined whether or not ADDF(m) is 1. Then, a loop of stepsC92, C93 and C94 is repeated while “m” is incremented to search anaddress with ADDF of “1”.

At step C92, if the ADDF(m) is 1, it is determined whether or not anaddress of a RECEIVED MAIL(n) coincides with an ADDRESS(m) (step C95).If there is no coincidence therebetween, a loop of steps C95, C93, C94and C92 is repeated while “m” is incremented to search an address incoincidence. At step C96, if there is an ADDRESS(m) which coincides withthe address of a RECEIVED MAIL(n), the address of a RECEIVED MAIL(n) isset as an address of a fixed form mail “B” (step C96) and the fixed formmail “B” which clearly indicates an emergency contact place istransmitted (step C97).

At step C88 of FIG. 46, if there is an ADDRESS(m) which coincides with atransmitter address of a RECEIVED MAIL(n) among the addresses which areall designated, program flow goes to step C96 of FIG. 47, thetransmitter address of a RECEIVED MAIL(n) is set as an address of afixed form mail “B” and the fixed form mail “B” with an emergencycontact place clearly indicated is transmitted (step C97).

At step C92 of FIG. 47, if ADDF(m) is not “1” or at step C95, if thereis no coincidence between a transmitter address of a RECEIVED MAIL(n)and an ADDRESS(m), then “m” is incremented, and as a result, if “m”exceeds the maximum number at step C94, the transmitter address of aRECEIVED MAIL(n) is set as an address of a fixed form mail “A” (stepC98) and the fixed form mail “A” which indicates only the state ofabsence is transmitted (step C99).

At step C88 of FIG. 46, if there is not an ADDRESS(m) which coincideswith a transmitter address of a RECEIVED MAIL(n) among the addresseswhich are all designated, “m” is incremented, and as a result, if “m”exceeds the maximum number at step C90, program flow goes to step C98,the transmitter address of a RECEIVED MAIL(n) is set as an address of afixed form mail “A” and the fixed form mail “A” which indicates only thestate of absence is transmitted (step C99).

As described above, according to the above mentioned third embodiment,the terminal 100 of FIG. 1 comprises:

mail storage means for storing a plurality of fixed form mails;

mail receiving means for receiving an electronic mail;

address designating means for designating an address of a specificreceiver;

mail determining means for determining whether or not a transmitteraddress of the received electronic mail is an address designated by theaddress designating means when it detects that the electronic mail isreceived by the mail receiving means;

mail selecting means for selecting one of fixed form mails stored insaid mail storage means based on a determination result by the maildetermining means; and

main transmitting means for transmitting the fixed form mail selected bythe mail selecting means to the same address as a transmitter address ofthe received electronic mail.

If the received electronic mail has an address of a specific receiver,transmitted is a specific fixed form mail, different from an ordinaryfixed form mail which is transmitted to one of other receivers.

In the above mentioned third embodiment, there is described anelectronic mail system in which a program to receive and transmitelectronic mails is stored in ROM 2, but such constitutions may beadopted that a program to transmit or receive an electronic mail isstored in such storage media as a floppy disk, a compact disk and thelike and an apparatus such as a personal computer or a word processorfor general purpose use or the like executes the program.

The machine readable storage medium stores a program for electronic mailprocessing, the program comprising:

(i) step of storing a plurality of fixed form mails;

(ii) step of receiving an electronic mail;

(iii) step of designating an address of a specific receiver;

(iv) step of determining whether or not a transmitter address of thereceived electronic mail is an address designated by the step (iii) whenit detects that the electronic mail is received by the step (ii);

(v) step of selecting one of fixed form mails stored in said mailstorage means based on a determination result by the step (iv) from theplurality of fixed form mails stored by the step (i); and

(vi) step of transmitting the fixed form mail selected by the step (v)to the same address as a transmitter address of the received electronicmail.

The program is executed by an apparatus such as a personal computer or aword processor for general purpose use, or the like.

The fourth embodiment of the present invention will be described.

FIG. 48 is a memory map of RAM 3 in the fourth embodiment. As can bemade easier in the figure, at each ADDRESS(1) to ADDRESS(M) in theaddress area, there is provided no flag ADDF which designatesindividually each address to which a fixed form mail “A” is transmitted,which is different from the third embodiment. Besides, there is providedno flag ALLF which designates by one operation all the addresses towhich fixed form mail “A” is transmitted. On the other hand, emergencyflags EMF are respectively provided in the RECEIVED MAIL(1) to RECEIVEDMAIL(N) of the received mail storage area. The other parts are the sameas the memory map of the third embodiment shown in FIG. 38. Theemergency flag is described later.

FIGS. 49 and 50 are flows of mail creation processing in the fourthembodiment and FIG. 51 is a mail creation screen image therefor. In thescreen image, there are provided an address list switch and atransmission switch on the mail creation screen image of the firstembodiment shown in FIG. 11, and in addition an emergency switch. InFIG. 49, not only are data of the mail creation area of RAM 3 clearedbut a mail creation frame screen image is displayed (step D1). A cursorfor the mouse 6 is displayed on the screen image of FIG. 51 (step D2)and a character cursor is displayed in the address area (step D3).

Then, it is determined whether or not the mouse 6 has been moved (stepD4) and if the mouse 6 has been moved, a cursor position on the screenimage is moved in accordance with the movement step D5). Then, it isdetermined whether or not the mouse 6 has been clicked (step D6) and ifthe mouse 6 has been clicked, processing is executed in accordance witha cursor position on the mail creation screen image of FIG. 51.

It is determined whether or not a cursor position is in an address inputarea (step D7) and the cursor position is this position, a charactercursor is set at the address input area (step D8). If a cursor positionis not in the address input area, it is determined whether or not thecursor position is in a subject input area (step D9) and the cursorposition is this position, a character cursor is set at the subjectinput area (step D10). If a cursor position is not in the subject inputarea either, it is determined whether or not the cursor position is in atext input area (step D11) and if the cursor position is this position,a character cursor is set at the text input area (step D12).

If a cursor position is not in the text input area either, it isdetermined whether or not the cursor position is an address list switchposition (step D13) and if the cursor position is this position, addressdisplay processing is executed (step D14). The address displayprocessing is the same flow as that of the first embodiment shown inFIG. 12 and an address list display screen image is also the same asshown in FIG. 13. If a cursor position is not the address list switchposition either, it is determined whether or not the cursor position isa transmission switch position (step D15) and the cursor position isthis position, a self-address is stored in a transmission address of themail creation area of RAM 3 (step D16) and transmission processing isexecuted (step D17). At this point, it is allowed that an icon switch oftransmission on the screen image is displayed in reverse and theprocessing is indicated to be during transmitting. Then, it isdetermined whether or not the transmission processing has been completed(step D18). If the transmission processing has not been completed, thetransmission processing of step D17 is continued. If the transmissionprocessing has been completed, the display of the mail creation screenimage is cleared (step D19) and the flow is terminated and a receivedmail screen image is displayed.

At step D15, if a cursor position is not the transmission switchposition, it is determined whether or not the cursor position is acancel switch position (step D20) and if the cursor position is thisposition, a content of a mail buffer is cleared (step D21) and the flowis terminated and the received mail screen image is displayed. If acursor position is not the cancel switch position, it is determinedwhether or not the cursor position is an emergency switch position (stepD22). If the cursor position is this position, a emergency flag EMF isinverted (step D23).

At step D6, if the mouse 6 has not been clicked, it is determinedwhether or not data input has been made from the key board 4 in a flowof FIG. 50 (step D24). If the data input has not been made, program flowgoes to step D4 of FIG. 49 and a movement of the mouse is checked. Ifthe data input has been made, it is determined whether or not acharacter cursor position is a position in the address input area (stepD25). If the character cursor position is this position, input data isdisplayed in the address input area (step D26) and the input data arestored in an address area of a mail creation buffer of RAM 3 (step D27).Then, the character cursor is set at a next character input position(step D28).

At step D25, if a character cursor position is not a position in theaddress input area, it is determined whether or not the character cursoris a position in the subject input area (step D29). If the charactercursor position is this position, input data are displayed in thesubject input area (step D30) and the input data are stored in thesubject area of the mail creation buffer of RAM 3 (step D31). Then, acharacter cursor is set at a next character input position (step D32).At step D29, if a character cursor position is not in the subject inputarea, it is determined whether or not the character cursor position is aposition in the text input area (step D33). If the character cursorposition is this position, input data are displayed in the text inputarea (step D34) and the input data are stored in the text area of a mailcreation buffer of RAM 3 (step D35). Then, the character cursor is setat a next character input position (step D36).

After the character cursor is moved at steps D28, D32 or D36, programflow goes to step D4 of FIG. 49 and a movement of the mouse 6 ischecked. After address list display processing is executed at step D14,after EMF is inverted at step D23 or after the data input processing iscompleted at step D25, program flow goes to step D4 and a movement ofthe mouse 6 is checked. At step D22 of FIG. 49, if a cursor position isan emergency switch position on the screen image of FIG. 51, EMF of FIG.48 is inverted, but at this point, it is allowed that the icon of theemergency switch is reversed and it is clearly indicated whether or nota current mode is an emergency mode.

FIGS. 52 and 53 are flows of the absence setting processing. An absencesetting screen image is the same as that of the first embodiment shownin FIG. 19. In FIG. 52, a time setting screen image is displayed in theabsence setting screen image (step D37) and a character cursor is set ata start date and time area (step D38). A cursor for the mouse 6 isdisplayed (step D39). Then it is determined whether or not the mouse 6has been moved (step D40) and if the mouse 6 has been moved, the cursoris moved in accordance with the movement of the mouse 6 (step D41).Then, it is determined whether or not the mouse 6 has been clicked (stepD42). If the mouse 6 has been clicked, it is determined whether or not acursor position is in a start date and time area (step D43). If thecursor position is this position, a character cursor is set at the startdate and time area (step D44).

If a cursor position is not in the start date and time area, it isdetermined whether or not the cursor position is in an end date and timearea (step D45). If the cursor position is this position, a charactercursor is set at the end date and time area (step D46). If a cursorposition is not in the end data and time area, it is determined whetheror not the cursor position is a mail “A” creation switch position on theabsence setting screen image (step D47). If the cursor position is thisposition, fixed form mail creation processing is executed (step D48).The fixed form mail creation processing is the same flow as that of thethird embodiment shown in FIG. 44. Then, a content of a mail buffer isstored in the fixed form mail “A” area of RAM 3 (step D49).

At step D47, if a cursor position is not the mail “A” creation switchposition, it is determined whether or not the cursor position is a mail“B” creation switch position on the screen image (step D50). If thecursor position is this position, then also the same fixed form mailcreation processing as that of step D48 is executed (step D51). Then, acontent of the mail buffer is stored in the fixed form mail “B” area ofRAM 3 (step D52).

At step D50, if a cursor position is not the mail “B” creation switchposition, it is determined whether or not the cursor position is an OKswitch position (step D53). If the cursor position is this position, theabsence setting screen image is cleared and the definite flag KAKUTEIFis set at “1” (step D54). Then, the flow is terminated.

At step D53, if a cursor position is not the OK switch position, it isdetermined whether or not the cursor position is a cancel switchposition (step D55). If the cursor position is this position, the dataof the date and time of mails “A” and “B” are cleared (step D56) and theabsence setting processing screen image is cleared and the definite flagKAKUTEIF is reset at “0” (step D57). Then, the flow is terminated.

At step D55, if a cursor position is not the cancel switch position,that is when a cursor position is not any one of the above mentionedpositions, or after processing according to a cursor position isexecuted, program flow goes to step D40 and a movement of the mouse 6 ischecked.

At step D42, If the mouse 6 has not been clicked, program flow goes to aflow of FIG. 53 and it is determined whether or not data input has beenmade from the key board 4 (step D58). If the data input has been made,it is determined whether or not a character cursor position is in thestart date and time area (step D59). If the character cursor position isthis position, the data of the start date and time input in the startdate and time area are displayed (step D60) and the data of the startdate and time are stored in RAM 3 (step D61). Then the character cursoris moved (step D62).

At step D59, if a character cursor position is not the start date andtime position, it is determined whether or not the character cursorposition is an end date and time position (step D63). If the charactercursor position is this position, the data of the end date and timeinput in the end date and time area are displayed (step D64) and thedata of the end date and time are stored in RAM 3 (step D65). Then thecharacter cursor is moved (step D62).

After the character cursor is moved at step D62, or if data input is notmade at step D58 or if a character cursor position is not any one of thestart date and time, and end date and time positions, program flow goesto step D40 of FIG. 52 and a movement of the mouse 6 is checked.

FIGS. 54 and 55 are flows of timer interrupt processing.

When timer interrupts occur at set intervals, the server 300 shown inFIG. 1 is accessed by CPU 1 of a terminal 100. In FIG. 54, it isdetermined whether or not a received mail is present in a mail box ofthe server 300 (step D66). If the received mail is not present, the flowis immediately terminated. If the received mail is present, a pointer“n” indicating the number of a RECEIVED MAIL(n) area of the receivedmail storage area of RAM 3 is set at “1” (step C67). Then, it isdetermined whether or not a RECEIVED MAIL(n) area designated by “n” isempty (step D68).

If a designated area is not empty, “n” is incremented (step D69) and itis determined whether or not “n” exceeds the maximum number (step D70).If “n” has not exceed the maximum number, program flow goes to step D68and it is determined whether or not the RECEIVED MAIL(n) area is empty.A loop of steps C68, C69 and C70 is repeated while “n” is incremented tosearch a RECEIVED MAIL(n) area with an empty space. At step D70, if “n”exceeds the maximum number, that is when none of the RECEIVED MAIL(1) toRECEIVED MAIL(N) of the received mail area of RAM 3 is empty, a receivedmail with the oldest reception data and time is searched (step D71).Then, the pointer “n” is set at a mail number thereof (step D72).

At step D68, if the designated RECEIVED MAIL(n) area is empty or at stepD72 when “n” is set at the mail number with the oldest reception dateand time, a received mail fetched from the server 300 is stored in theRECEIVED MAIL(n) area (step D73). Then, an unseal flag KAIFUF(n) isreset at “0” to indicate the seal state (step D74) and TIME(n) is set ata reception date and time (step D75).

Then, it is determined whether or not the definite flag KAKUTEIF set inthe absence setting processing of FIG. 52 is “1” (step D76). If the flagis “0”, the flow is terminated. If the flag is “1”, it is determinedwhether or not the reception date and time set to TIME(n) is in a periodof a start date and time to en end date and time in the absence (stepD77). If the reception date and time is not in the period, the flow isterminated.

If the reception date and time set to TIME(n) is in the period, it isdetermined whether or not the emergency flag EMF(n) of a RECEIVEDMAIL(n) is “1” (step D78). If the EMF(n) is “1” (emergency), atransmitter address of the RECEIVED MAIL(n) is set as an address of afixed form mail “B” (step D79) and the fixed form mail “B” with anemergency contact place clearly indicated is transmitted to the addressin the same way as in the case of the third embodiment shown in FIG. 45B(step D80). At step D78, of the EMF(n) is “0” (non-emergency), atransmitter address of a RECEIVED MAIL(n) is set as an address of afixed form mail “A” (step D81) and an ordinary fixed form mail “A” whichnotices only the state of absence is transmitted to the address in thesame way as in the case of the third embodiment shown in FIG. 45A (stepD82).

As described above, according to the above mentioned fourth embodiment,the terminal 100 of FIG. 1 comprises:

mail storage means for storing a plurality of fixed form mails;

mail receiving means for receiving an electronic mail;

mail determining means for determining whether or not specificidentification information is included in the electronic mail when itdetects that the electronic mail is received by the mail receivingmeans;

mail selecting for selecting one of fixed form mails stored in said mailstorage means based on a determination result by the mail determiningmeans; and mail transmitting means for transmitting the fixed form mailselected by the mail selecting means to the same address as atransmitter address of the received electronic mail.

If specific identification information is included in a receivedelectronic mail, a specific fixed form mail is transmitted and whenspecific identification information is not included, an ordinary fixedform mail is transmitted.

In the above mentioned fourth embodiment, there is described anelectronic mail system in which a program to receive and transmitelectronic mails is stored in ROM 2, but such constitutions may beadopted that a program to transmit or receive an electronic mail isstored in such storage media as a floppy disk, a compact disk and thelike and an apparatus such as a personal computer or a word processorfor general purpose use, or the like executes the program.

The machine readable storage medium stores a program for electronic mailprocessing, the program comprising:

(i) step of storing a plurality of fixed form mails;

(ii) step of receiving an electronic mail;

(iii) step of determining whether or not specific identificationinformation is included in a received electronic mail when it detectsthat the electronic mail is received by the step (ii);

(iv) step of electronic one of fixed form mails stored in said mailstorage means based on a determination result by the step (iii) from theplurality of fixed form mails stored by the step (i); and

(v) step of transmitting the fixed form mail selected by the step (iv)to the same address as a transmitter address of the received electronicmail.

The program is executed by an apparatus such as a personal computer or aword processor for general purpose use, or the like.

The fifth embodiment will be described.

FIG. 56 is a memory map of RAM 3 in the fifth embodiment. As is madeclear in the figure, a single kind of fixed form mail area is providedand an area in which there is stored the same as a fixed form mail whichindicates the state of absence in the third embodiment shown in FIG. 45Ais provided. An area of a transfer address for use in transferring areceived mail is provided. The other parts are the same as those of thememory map of the third embodiment shown in FIG. 38. Flows, which CPU 1executes, are same as those of the first embodiment except absencesetting processing and timer interrupt processing, and figures anddescription are omitted.

FIGS. 57 and 58 are flows of absence setting processing and FIG. 59shows an absence setting screen image. There are displayed in the screenimage areas of a start date and time and an end date and time in theabsence, an address designation switch, a transfer address switch, amail creation switch, an OK switch. In FIG. 57, a time setting screenimage is displayed in the absence setting screen image ((v) step 1), acharacter cursor is set at the start date and time area (step E2). And acursor for the mouse 6 is displayed (step E3). Then, it is determinedwhether or not the mouse 6 has been moved (step E4) and if the mouse 6has been moved, a cursor position is moved in accordance with themovement of the mouse 6 (step E5). Then, it is determined whether or notthe mouse 6 has been clicked (step E6). If the mouse 6 has been clicked,it is determined whether or not a cursor position is in the start dateand time area (step E7). If the cursor position is this position, acharacter cursor is set at the start date and time area (step E8).

If a cursor position is not in the start date and time area, it isdetermined whether or not the cursor position is in the end date andtime area (step E9). If the cursor position is this position, acharacter cursor is set at the end date and time area (step E10). If acursor position is not in the end date and time area, it is determinedwhether or not a cursor position is a mail creation switch position(step E11). If the cursor position is this position, fixed form mailcreation processing is executed (step E12). The fixed form mail creationprocessing is same as that of the third embodiment shown in FIG. 44.Then, a content of a mail buffer is stored in the fixed form mail areaof RAM 3 (step E13).

At step E11, if a cursor position is not the mail creation switchposition, it is determined whether or not the cursor position is atransfer address input switch position on the screen image (step E14).If the cursor position is this position, transfer address inputprocessing is executed (step E15). The transfer address input processingis same as the flow in the second embodiment shown in the flows of FIGS.31 to 33. At step E14, if a cursor position is not the transfer addressinput switch position, it is determined whether or not the cursorposition is an OK switch position (step E16). If the cursor position isthis position, an absence setting screen image is cleared and thedefinite flag KAKUTEIF is set at “1” (step E17). Then, the flow isterminated.

At step E16, if a cursor position is not the OK switch position, it isdetermined whether or not the cursor position is an cancel switchposition (step E18). If the cursor position is this position, data of adate and time area of a fixed form mail is cleared (step E19), anabsence setting screen image is cleared and the definite flag KAKUTEIFis reset at “0” (step E20).

Then the flow is terminated. At step E18, if a cursor position is notthe cancel switch position, it is determined whether or not the cursorposition is an address designation switch position (step E21). If thecursor position is this position, address designation processing isexecuted (step E22). The address designation processing is same as theflow of the third embodiment shown in FIG. 42 and an address listdisplay screen image is same as the screen image of FIG. 43. If thecursor position is not any one of the above mentioned positions or afterprocessing according to a cursor position is executed, program flow goesto step E4 and a movement of the mouse is checked.

At step E6, if the mouse 6 has not been clicked. Program flow goes to aflow of FIG. 58 and it is determined whether or not data input has beenmade from the key board 4 (step E23). If the data input has been made,it is determined whether or not a character cursor position is in thestart date and time area (step E24). If the character cursor position isthis position, the data of the start date and time input in the startdate and time area are displayed (step E25), the data of the start dateand time are stored in RAM 3 (step E26). Then, a character cursor ismoved (step E27).

At step E24, if a character cursor is not the start data and timeposition, it is determined whether or not the character cursor positionis an end date and time position (step E28). If the character cursorposition is this position, the data of the end data and time input inthe end date and time area are displayed (step E29) and the data of theend date and time are stored in RAM 3 (step E30). Then, a charactercursor is moved (step E27). After the character cursor is moved at stepE27, or if the data input is not made in step E23 or if a charactercursor position is not any one of the start date and time, and end dateand time positions, program flow goes to step E4 of FIG. 57 and amovement of the mouse 6 is checked.

FIGS. 60 and 61 are flows of timer interrupt processing.

When timer interrupts occur at set intervals, the server 300 shown inFIG. 1 is accessed by CPU 1 of a terminal 100. In FIG. 60, it isdetermined whether or not a received mail is present in a mail box ofthe server 300 (step E31). If the received mail is not present, the flowis immediately terminated. If the received mail is present, a pointer“n” indicating the number of a RECEIVED MAIL(n) area of the receivedmail storage area of RAM 3 is set at “1” (step E32). Then, it isdetermined whether or not a RECEIVED MAIL(n) area designated by “n” isempty (step E33).

If a designated area is not empty, “n” is incremented (step E34) and itis determined whether or not “n” exceeds the maximum number (step E35).If “n” has not exceeded the maximum number, program flow goes to stepE33 and it is determined whether or not the RECEIVED MAIL(n) area isempty. A loop of steps E33, E34 and E35 is repeated while “n” isincremented to search a RECEIVED MAIL(n) area with an empty space. Atstep E35, if “n” exceeds the maximum number, that is when none of theRECEIVED MAIL(1) to RECEIVED MAIL(N) areas of the received mail storagearea of RAM 3 is empty, a received mail with the oldest reception dataand time is searched (step E36). Then, the pointer “n” is set at a mailnumber thereof (step E37).

At step E33, if the designated RECEIVED MAIL(n) area is empty or at stepE37 when “n” is set at the mail number with the oldest reception dataand time, a received mail fetched from the server 300 is stored in theRECEIVED MAIL(n) area (step E38). Then, an unseal flag KAIFUF(n) isreset at “0” so as to indicate the seal state (step E39) and TIME(n) isset at a reception date and time (step E40).

Then, it is determined whether or not the definite flag KAKUTEIF set inthe absence setting processing of FIG. 57 is “1” (step E41). If the flagis “0”, the flow is terminated since there is not absence setting. Ifthe flag is “1” (absence setting), it is determined whether or not thereception date and time set as TIME(n) is in a period of a start dateand time to an end date and time in the absence (step E42). If thereception date and time is not in the period, the flow is terminated.

If the reception date and time being set as the TIME(n) is in theperiod, it is determined whether or not the flag ALLF is “1”, that is itis determined whether or not all the addresses are designated in theaddress area of RAM 3 (step E43). If all the addresses are designated, apointer “m” indicating an address number of the address area is set at“1” (step E44). Then, it is determined whether or not a transmitteraddress of a RECEIVED MAIL(n) and an ADDRESS(m) designated by “m”coincide with each other (step E45). If there is no coincidence, “m” isincremented (step E46) and it is determined whether or not “m” exceedsthe maximum number (step E47). If “m” does has not exceeded the maximumnumber, program flow goes to step E45, and it is determined whether ornot a transmitted address of a RECEIVED MAIL(n) and a designatedADDRESS(m) of the address area coincide with each other. Then, a loop ofsteps E45, E46 and E47 is repeated while “m” is incremented to search inADDRESS(m) in coincidence.

At step E43, if the ALLF is “0”, a pointer “m” is set at “1” in a flowof FIG. 61 (step E48) and it is determined whether or not the designatedflag ADDF(m) is “1”, that is, it is determined whether or not thedesignated flag ADDF(m) is a designated address (step E49). If the flagis “0”, “m” is incremented and a next address is designated (step E50)and it is determined whether or not “m” exceeds the maximum number (stepE51). If “m” has not exceeded the maximum number, program flow goes tostep E49 and it is determined whether or not the ADDF(m) is “1”. Then aloop of steps E49, E50 and E51 is repeated while “m” is incremented tosearch an address with ADDF of 1.

At step E49, if the ADDF(m) is “1”, it is determined whether or not anaddress of a RECEIVED MAIL(n) and an ADDRESS(m) coincides with eachother (step E52). If there is no coincidence, a loop of steps E52, E50,E51 and E49 is repeated while “m” is incremented to search an address incoincidence. At step E52, if there is an ADDRESS(m) which coincides withan address of a RECEIVED MAIL(n), transfer mail creation processing isexecuted (step E53). The transfer mail creation processing is same asthe flow of the second embodiment shown in FIG. 37. Then, the transfermail is transmitted to an predetermined address (step E54). For example,a transfer mail is transmitted to addresses of a portable terminalcarried by a receiver on the road who has made absence setting or apersonal computer in home use of the same receiver and the like.

At step E45 of FIG. 60, if there is an ADDRESS(m) which coincides withtransmitter address of a RECEIVED MAIL(n) among all the designatedaddresses, program flow goes to step E53 of FIG. 61 to prepare atransfer mail and the transfer mail is transmitted (step E54).

At step E49 of FIG. 61, if the ADDF(m) is not “1”, or at step E52 when atransmitter address of a RECEIVED MAIL(n) does not coincide with anADDRESS(m), “m” has been incremented, and as a result, if “m” exceedsthe maximum number, the transmitter address of a RECEIVED MAIL(n) is setas an address of a fixed form mail (step E55) and the fixed form mail istransmitted as response (step E56).

At step E45 of FIG. 60, if there is no ADDRESS(m) which coincides with atransmitter address of a RECEIVED MAIL(n) among all the designatedaddresses, “m” has been incremented and as a result, if “m” exceeds themaximum number at step E47, program flow goes to step E55 of FIG. 60, atransmitter address of a RECEIVED MAIL(n) is set as an address of afixed form mail and the fixed form mail is transmitted (step E56).

As described above, according to the above mentioned fifth embodiment,the terminal 100 of FIG. 1 comprises:

mail receiving means for receiving an electronic mail;

address designating means for designating an address of a specificreceiver;

mail determining means for determining whether or not a transmitteraddress of the received electronic mail is the address designated by theaddress designating means when it detects that the electronic mail isreceived by the mail receiving means;

mail transmitting means for transmitting a fixed form mail to the sameaddress as the transmitter address of the received electronic mail whena determination result by the mail determining means is not thedesignated address; and

mail transfer means for transferring the received electronic mail to apredetermined address when a determination result by the maildetermining means is the designated address.

If a transmitter address of a received mail is a designated address, thereceived electronic mail is transferred to the designated address. Onthe other hand, if a transmitted address of a received mail is not adesignated address, a fixed form mail is transmitted to the same addressas a transmission address of the received electronic mail.

In the above mentioned fifth embodiment, there is described anelectronic mail system in which a program to received and transmitelectronic mails is stored in ROM 2, but such constitutions may beadopted that a program to transmit or receive an electronic mail isstored in such storage media as a floppy disk, a compact disk and thelike and an apparatus such as a personal computer or a word processorfor general purpose use, or the like executes the program.

The machine readable storage medium stores a program for electronic mailprocessing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of designating an address of a specific receiver;

(iii) step of determining whether or not a transmitter address of thereceived electronic mail is an address designated by the addressdesignating means when it detects that the electronic mail is receivedby the step (i);

(iv) step of transmitting a fixed form mail to the same address as thetransmitter address of the received electronic mail when a determinationresult by the step

(iii) is not the designated; and

(v) step of transferring the received electronic mail to a predeterminedaddress when a determination result by the step (iii) is the designatedaddress.

The program is executed by an apparatus such as a personal computer or aword processor for general purpose use, or the like.

The sixth embodiment will be described.

FIG. 62 is a memory map of RAM 3 in the sixth embodiment. As is madeclear in the figure, a single kind of fixed form mail area is providedand an area in which there is stored the same as a fixed form mail whichindicates the state of absence in the third embodiment shown in FIG. 45Ais provided. An area of a transfer address for use in transferring areceived mail is provided. The other parts are the same as those of thememory map of the fourth embodiment shown in FIG. 48. Flows which CPU 1executes are same as those of the first embodiment except absencesetting processing and timer interrupt processing, and figures anddescription are omitted.

FIGS. 63 and 64 are flows of absence setting processing and FIG. 65shows an absence setting screen image. There are displayed in the screenimage areas of a start date and time, and an end date and time in theabsence, a transfer address switch, a mail creation switch, an OKswitch. In FIG. 63, a time setting screen image is displayed in theabsence setting screen image (step F1), a character cursor is set at thestart date and time area (step F2) and a cursor for the mouse 6 isdisplayed (step Fe). Then, it is determined whether or not the mouse 6has been moved (step F4) and if the mouse 6 has been moved, a cursorposition is moved in accordance with the movement of the mouse 6 (stepF5). Then, it is determined whether or not the mouse 6 has been clicked(step F6). If the mouse 6 has been clicked, it is determined whether ornot a cursor position is in the start date and time area (step F7). Ifthe cursor position is this position, a character cursor is set at thestart date and time area (step F8).

If a cursor position is not in the start date and time area, it isdetermined whether or not a cursor position is in the end date and timearea (step F9). If the cursor position is this position, a charactercursor is set at the end date and time area (step F10). If a cursorposition is not in the end date and time area, it is determined whetheror not the cursor position is the mail creation switch position in theabsence setting screen image (step F11). If the cursor position is thisposition, fixed form mail creation processing is executed (step F12).Then, a content of a mail buffer is stored in the fixed mail area of RAM3 shown in FIG. 62 (step F13).

At step F11, if a cursor position is not the mail creation switchposition, it is determined whether or not the cursor position is thetransfer address input switch position on the screen image (step F14).If the cursor position is this position, transfer address inputprocessing is executed (step F15). The transfer address input processingis the same as the flow in the second embodiment shown in FIGS. 31 to33.

At step F14, if a cursor position is not the transfer address inputswitch position, it is determined whether or not the cursor position isthe OK switch position (step F16). If the cursor position is thisposition, the absence screen image is cleared and the definite flagKAKUTEIF is set at “1” (step F17). Then, the flow is terminated.

At step F16, if a cursor position is not the OK switch position, it isdetermined whether or not the cursor position is the cancel switchposition (step F18). If the cursor position is this position, the dataof a date and time area of the fixed form mail is cleared (step F19) andthe absence setting processing screen image is cleared and the definiteflag KAKUTEIF is reset at “0” (step F20). Then, the flow is terminated.

At step F18, if a cursor position is not the cancel switch position,that is, if a cursor position is not any one of the above mentionedpositions or after processing in accordance with a cursor position hasbeen completed, program flow goes to step F4 and a movement of the mouse6 is checked.

At step F6, if the mouse 6 has not clicked, program flow goes to a flowof FIG. 64 and it is determined whether or not data input has been made(step F21). If the data input has been made, it is determined whether ornot a character cursor position is in the start date and time area (stepF22). If the character cursor position is this position, the data of thestart date and time input in the start date and time area are displayed(step F23) and the data of the start date and time are stored in RAM 3(step F24). Then, the character cursor is moved (step F25).

At step F22, if a character cursor position is not the start date andtime position, it is determined whether or not the character cursorposition is the end date and time position (step F26). If the charactercursor position is this position, the data of the end date and timeinput in the end date and time area are displayed (step F27) and thedata of the end date and time are stored in RAM 3 (step F28). Then, thecharacter cursor is moved (step F25).

At step F25, after the character cursor is moved, or if the data inputhas not been made or if a character cursor position is not any one ofthe start date and time and end date and time positions, program flowgoes to step F4 of FIG. 63 and a movement of the mouse 6 is checked.

FIGS. 66 and 67 are flows of timer interrupt processing.

When timer interrupts occur at set intervals, the server 300 shown inFIG. 1 is accessed by CPU 1 of a terminal 100. In FIG. 66, it isdetermined whether or not a received mail is present in a mail box ofthe server 300 (step F30). If the received mail is not present, the flowis immediately terminated. If the received mail is present, a pointer“n” indicating the number of a RECEIVED MAIL(n) area of the receivedmail storage area of RAM 3 is set at “1” (step F31). Then, it isdetermined whether or not a RECEIVED MAIL(n) area designated by “n” isempty (step F32).

If the designated area is not empty, “n” is incremented (step F33) andit is determined whether or not “n” exceeds the maximum number (stepF34). If “n” has not exceeded the maximum number, program flow goes tostep F32 and it is determined whether or not the RECEIVED MAIL(n) areais empty. A loop of steps F32, F33 and F34 is repeated while “n” isincremented to search a RECEIVED MAIL(n) area with an empty space. Atstep F34, if “n” exceeds the maximum number, that is, if none of theRECEIVED MAIL(1) to RECEIVED MAIL(N) of the received mail storage areaof RAM 3 is empty, a received mail with the oldest reception data andtime is searched (step F35). Then, the pointer “n” in set at a mailnumber thereof (step 36).

At step F32, if the designated RECEIVED MAIL(n) area is empty or at stepF36 when “n” is set at the mail number with the oldest reception dateand time, a received mail fetched from the server 300 is stored in theRECEIVED MAIL(n) area (step F37). Then, an unseal flag KAIFUF(n) isreset at “0” in order to indicate the sealed state (step F38) andTIME(n) is set at the reception date and time (step F39).

Then, it is determined whether or not the definite flag KAKUTEIF set inthe absence setting processing of FIG. 63 is “1” (step E40). If the flagis “0”, the flow is terminated since there is no absence setting. If theflag is “1” (absence setting), it is determined whether or not thereception date and time at which TIME(n) is set is in a period of astart date and time to an end date and time in the absence (step F41).If the reception date and time is not in the period, the flow isterminated.

If the reception date and time at which TIME(n) is set is in the period,it is determined whether or not the emergency flag EMF(n) is “1” in aflow of FIG. 67 (step F42). If the EMF(n) is “1” (emergency), transfermail creation processing is executed (step F43). The transfer mailcreation processing is the same as the flow of the second embodimentshown in FIGS. 31 to 33. Then, a created transfer mail is transmitted toa predetermined address (step F44). For example, the transfer mail istransmitted to addresses of a portable terminal carried by a receiver onthe road who has made absence setting or a personal computer in home useof the same receiver. At step F42, if the EMF(n) is “0” (non-emergency),a transmitter address of a RECEIVED MAIL(n) is set an address of a fixedform mail (step F45) and an ordinary fixed form mail which notices onlythe state of absence is transmitted to the address in the same way as inthe case of the third embodiment shown in FIG. 45A (step F46).

As described above, according to the above mentioned sixth embodiment,the terminal 100 of FIG. 1 comprises:

mail receiving means for receiving an electronic mail;

mail determining means for determining whether or not specificidentification information is included in the electronic mail when itdetects that the electronic mail is received by the mail receivingmeans;

mail transmitting means for transmitting a fixed form mail to the sameaddress as a transmitter address of the received electronic mail whenthe mail determining means determines that the specific identificationinformation is not included; and

mail transfer means for transferring the received electronic mail to apredetermined address when the mail determining means determines thatthe specific identification information is included.

If a transmitter address of a received electronic mail is a designatedtransmitter address, the received electronic mail is transmitted to adesignated receiver address. On the other hand, if a transmitter addressof a received electronic mail is not a designated transmitter address, afixed form mail is transmitted to the transmitter address of thereceived electronic mail.

In the above mentioned sixth embodiment, there is described anelectronic mail system in which a program to receive and transmitelectronic mails is stored in ROM 2, but such constitutions may beadopted that a program to transmit or receive an electronic mail isstored in such media as a floppy disk, a CD and the like and anapparatus such as a personal computer or a word processor for generalpurpose use, or the like executes the program.

The machine readable storage medium stores a program for electronic mailprocessing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of designating an address of a specific receiver;

(iii) step of determining whether or not a transmitter address of thereceived electronic mail is an address designated by the addressdesignating means when it detects that the electronic mail is receivedby the step (i);

(iv) step of transmitting a fixed form mail to the same address as thetransmitter address of the received electronic mail when a determinationresult by the step (iii) is not the designated address; and

(v) step of transferring the received electronic mail to a predeterminedaddress when a determination result by the step (iii) is the designatedaddress.

The program is executed by an apparatus such as a personal computer or aword processor for general purpose use, or the like.

The seventh embodiment will be described.

FIG. 68 is a memory map of RAM 3 in the seventh embodiment. As shown inthe figure, there is provided a mail creation area, an address area, areceived mail storage area and other areas.

The mail creation is an area in which the data of an electronic mail tobe transmitted is stored and the area comprises a receiver address, asubject, a text, a response flag HENSINF indicating that an electronicmail to be transmitted is a mail which designates a response date andtime and a data of the response date and time. In an address area, thereis registered M addresses comprising ADDRESS(1) to ADDRESS(M) of aplurality of other terminals 100 to which transmission is conducted.Each address comprises a name and address of a designated party and amail type. The received mail storage area comprises areas of RECEIVEDMAIL(1) to RECEIVED MAIL(n) and N received mails can be stored. Eachdata of the RECEIVED MAIL(1) to RECEIVED MAIL(N) comprises a transmitteraddress, a subject, a text, a register TIME storing a reception date andtime, an unseal flag KAIFUF indicating whether or not a received mail isunsealed, a response flag HENSINF indicating whether a response date andtime is designated and a data of response date and time. The KAIFUF isset at “1” when a received electronic mail is unsealed and set at “0”when is kept sealed. The HENSINF is set at “1” when a received mail is amail that designates a response date and time and set at “0” when areceived mail is a mail, which does not designate a response, date andtime.

In addition, RAM 3 is provided with an area 34 which stores documents oftwo kinds of fixed form mail “A” and fixed form mail “B” to betransmitted, an area for a mail of a request for a change of responsedate and time mail, an area for WAITING ADDRESS(1) to ADDRESS(L) ofreceiver sides waiting for an electronic mail responding to a responsemail and an area for WAITING MAIL NUMBER(1) to NUMBER(L) having therespective waiting addresses, an area for passwords indicating whetheror not a mail of a request for change of response date and time isadmitted and an area for a flag PASF corresponding to the password, andareas for a start date and time, and end date and time of a specificperiod of time such as an absent period or the like.

FIGS. 69 and 70 are flow charts showing a routine of reception displayprocessing. FIG. 71 shows a reception display screen image.

In FIG. 69, a received mail frame screen image is displayed (step G1)and a pointer “n” designating RECEIVED MAIL(1) to RECEIVED MAIL(N) inthe received mail storage area of RAM 3 is set as 1 (step G2) and a loopprocessing of step G3 to step G10 is executed while “n” is incrementedto display the name of a transmitter, a subject, a reception date andtime and the like.

In other words, in the received mail storage area of FIG. 68, a RECEIVEDMAIL(n) designated by “n” and the reception date and time TIME(n)thereof are displayed on the screen image (step G3). Then, it isdetermined whether or not a flag KAIFUF(n) of a displayed received mailis “0” (step G4). If the flag is “0”, a seal mark indicated by aconcentric double circle is displayed in a space at the left side of aname of a received mail list of FIG. 71, since the received mail issealed (step G5). At step G4, if the flag is “1”, a seal mark is notdisplayed since the received mail has already unsealed.

Then, it is determined whether or not a response date and timedesignating flag HENSINF(n) of a received mail is “1” (step G6) and ifthe flag is “1”, a response date and time designating mark (exclamationmark !) is displayed in a space at the side of a reception date and timeon the screen image of FIG. 71 (step G7). If the flag is “0”, a responsedate and time designating mark is not displayed. Then, “n” isincremented (step G8) and it is determined whether or not “n” is lessthan or equal to the maximum number (step G9). If “n” is less than orequal to the maximum number, it is determined whether or not a MAIL(n)is empty (step G10). If the MAIL(n) is not empty, program flow goes tostep G3 and the MAIL(n) is displayed on the screen image. Then, a loopof step G3 to step G10 is repeated while “n” is incremented to displayreceived mails successively till MAIL(n) is empty.

At step G9, if a pointer “n” is larger than the maximum number, or if aMAIL(n) designated by “n” is empty at step G10, register “A” whichdesignates a received mail to be displayed in reverse is set at “1”(step G11) and a MAIL(A) list is displayed in reverse on the screenimage of FIG. 6 (step G12). Therefore, at first, the name and receptiondate and time of a received mail at the first position of a receivedmail list are displayed in reverse.

Then, a cursor is displayed in the screen image (step F13) and amovement of the mouse 6 is checked (step G14). If the mouse 6 is moved,a cursor display is moved in accordance with the movement (step F15).Then, it is determined whether or not the mouse 6 has been clicked (stepG16). If the mouse 6 is not clicked, program flow goes to step G14 and amovement of the mouse 6 is checked. If the mouse 6 has been clicked, itis determined whether or not the cursor position on the clicking is aposition on the screen image of the received mail list (step G17). If acursor position is any one of the positions, a pointer “A” is set at amail number of a cursor position (step G18). Then, a MAIL(A) list isdisplayed in reverse (step G19). The other mail lists displayed inreverse are made normal (step G20). Thereafter, program flow goes tostep G14 and a movement of the mouse 6 is checked.

At step G17, if a cursor position is not on the screen image of a maillist, program flow goes to a flow of FIG. 70 and it is determined atwhich of an absence switch, a delete switch, an ordinary mail creationswitch, a response data and time designated mail creation switch, anaddress input switch, an unseal switch and a cancel switch among iconswitches in the top portion of the screen image of FIG. 71 the cursorposition is or not.

It is determined whether or not a cursor position is the unseal switchposition (step G21) and if the cursor position is this position, maildisplay processing is executed (step G22). The mail display processingis further described later. If a cursor position is not the unsealswitch position, it is determined whether or not the cursor position isat the ordinary mail creation switch (step G23) and if the cursorposition is this position, ordinary mail creation processing is executed(step G24). If a cursor position is not the ordinary mail creationswitch position, it is determined whether or not the cursor position isthe response date and time designated mail creation switch position(step G25) and if the cursor position in this position, the responsedate and time designated mail creation processing is executed (stepG26). The response data and time designated mail creation processing isfurther described later. If a cursor position is not the response dataand time designated mail creation switch position, it is determinedwhether or not the cursor position is the absence switch position (stepF27) and if the cursor position is this position, absence settingprocessing is executed (step G28). The absence setting processing isfurther described later.

If a cursor position is not the absence switch position, it isdetermined whether or not the cursor position is the address inputswitch position (step G29) and if the cursor position is this position,the address input processing is executed (step G30). If a cursorposition is not the address switch position, it is determined whether ornot the cursor position is the delete switch position (step G31) and ifthe cursor position is this position, MAIL(A) is deleted from RAM 4(step G32) and the other received mails are sorted in the order of timeat which the mails are received (step G33).

If a cursor position is not the delete switch position, it is determinedwhether or not the cursor position is the cancel switch position (stepG34). If the cursor position is this position, a received mail displayis cleared (step G35) and the flag ONF is reset at “0” (step G36). Then,the flow is terminated. After processing at step G22, G24, G26, G28,G30, G33 or G36, or if a cursor position is not at any one of the iconswitches in the top portion of the screen image of FIG. 71, program flowgoes to step G14 of FIG. 69 and a movement of the mouse 6 is checked onthe screen image of FIG. 71.

Since the ordinary mail creation processing of G24 in reception displayprocessing of FIG. 70 and the address input processing of G30 arerespectively the same as the flows of them ail creation processing ofFIGS. 9 and 10, and the address input processing of FIGS. 14 and 15 inthe first embodiment, figures and description are omitted.

FIG. 72 is a flow of mail display processing at step G22 of FIG. 70.FIG. 73 is a display screen image of a response data and time designatedmail. In FIG. 72, it is determined whether or not the flag HENSINF(A) is“1” (step G37). In other words, it is determined by the flag whether ornot a RECEIVED MAIL(A) is a mail which designates a response date andtime thereof. If the HENSINF is “1”, a frame screen image of a responsedate and time designated mail of FIG. 73 is displayed (step G38). On theother hand, if the HENSINF is “0”, a frame screen image of an ordinarymail is displayed (step G39). The ordinary mail is the same as the mailshown in FIG. 8 in the first embodiment.

In the displayed frame screen image, the address of a RECEIVED MAIL(A)is displayed in an receiver address area (step G40), subject data of theMAIL(A) are displayed in a subject area (step G41) and text data of theRECEIVED MAIL(A) are displayed in a text area (step G42). In addition,in accordance with an unseal indication, the KAIFUF(A) is set at “1”(step G43). Further, it is determined whether or not the HENSINF(A) is“1” (step G44) and if the flag is “1”, response date and time of aRECEIVED MAIL(A) is displayed in a response date and time area on thescreen image of FIG. 73 (step G45).

Then, a cursor is displayed in display screen image of an ordinary mail,not shown, or a response date and time designated mail (step G46) and itis determined whether or not the mouse 6 has been moved (step G47). Ifthe mouse 6 has been moved, a cursor is moved in accordance with themovement (step G48). Then, it is determined whether or not the mouse hasbeen clicked (step G49). If the mouse 6 has been clicked, it isdetermined whether or not a cursor position is a cancel switch position(step G50), if the cursor position is this position, the mail displayscreen image is cleared (step G51) and a seal mark of the RECEIVEDMAIL(A) is erased (step G52). Then, the flow is terminated. At step G49,if the mouse 6 has not been clicked, of if a cursor position is not thecancel switch position at step G50, program flow goes to step G47 and amovement of the mouse 6 is checked.

FIGS. 74 to 76 are flows of response designated mail creation processingat step G26 of FIG. 70 and FIG. 77 is a response designated mailcreation screen image.

In FIG. 74, the mail creation area of RAM 3 is cleared (step G53) and aframe screen image of a response designated mail (step G54). Then, theflag HENSINF in the mail creation area is set at “1” (step G55). Then,not only is a cursor for the mouse 6 displayed (step G56) but acharacter cursor for character inputting is displayed in an addressinput area (step G57).

Then, it is determined whether or not the mouse 6 has been moved (stepG58). If the mouse 6 has been moved, a cursor is moved in accordancewith the movement (step G59). Then, it is determined whether or not themouse 6 has been clicked (step G60) and if the mouse 6 has been clicked,it is determined whether or not a cursor position is in an input area ofFIG. 77 in which a character is input (step G61). If the cursor positionis in the input area, it is determined which of a subject area, a textarea or a response date and time area the input area is (step G62).

If a cursor position is in the address area, the character cursor is setat the address area (step G63). If a cursor position is in the subjectarea, the character cursor is set at the subject area (step G64). If acursor position is in the text area, the character cursor is set at thetext area (step G65). If a cursor position is in the response date andtime area, the character cursor is set at the response date and timearea (step G66). Then, after the character cursor is moved, program flowgoes to step G58 and a movement of the mouse 6 is checked.

At step G61, if a cursor position is not in the input area, program flowgoes to FIG. 75 and it is determined whether or not the cursor positionis on any one of the icon switches on the screen image of FIG. 77 (stepG67). If a cursor position is on an icon switch, it is determined onwhich the cursor position is, an address list switch, a transmissionswitch or a cancel switch (step G68).

If a cursor position is on the transmission switch, a transmitteraddress of the mail creation area of RAM 3 is set as a self-address(step G69), transmitting processing is executed (step G70). Then, it isdetermined whether or not transmission has been completed (step G71) andif the transmission has not been completed, the transmitting processingat step G70 is continued. If the transmission has been completed adisplay of a response designated mail creation screen image of FIG. 77is cleared (step G72) and the flow is terminated.

At step G68, if a cursor position is on the address list switch, addresslist display processing is executed (step G73). The address list displayprocessing is the same as the flow of the first embodiment shown in FIG.12. After this processing, program flow goes to step G58 of FIG. 74 anda movement of the mouse 6 is checked.

At step G68 of FIG. 75, if a cursor position is on the cancel switch,the mail creation area of RAM 3 is cleared (step G74) and a display of aresponse designated mail creation screen image is cleared (step G72).Then, the flow is terminated. At step G67, if a cursor position is noton any one of the icon switches, program flow goes to step G58 of FIG.74 and a movement of the mouse 6 is checked.

At step G60 of FIG. 74, if the mouse is not clicked, program flow goesto FIG. 76 and it is determined whether or not data input has been madefrom the key board 4 (step G75). If the data input has been made, it isdetermined in which a character cursor position is, an address-inputarea, a subject-input area, a text input area or a response date andtime area (step G76).

If a character cursor position is in the address input area, input dataare displayed in the address input area on the screen image (step G77)and the input data are stored in an address area of the mail creationarea of RAM 3 (step G78). If a character cursor position is in thesubject input area, input data are stored in a response date and timearea of the mail creation area of RAM 3 (step G84).

After the input data are stored at step G78, G80, G82 or G84, acharacter cursor is moved (step G85). Then, after the character cursoris moved, or if data input has not made ate step G75, program flow goesto step G58 and a movement of the mouse 6 is checked.

FIGS. 78 to 80 are flows of absence setting processing at step G28 ofFIG. 70 and FIG. 81 is an absence setting processing screen image.

In FIG. 78, the absence setting processing screen image of FIG. 81 isdisplayed (step G86) and a character cursor is set at a start date andtime area (step G87). Then, a cursor for the mouse 6 is displayed (stepG88). Then, it is determined whether or not the mouse 6 has been moved(step G89) and if the mouse 6 has been moved, the cursor is moved inaccordance with the movement (step G90). Then, it is determined whetheror not the mouse 6 has been clicked (step G91). If the mouse 6 has beenclicked, it is determined whether or not a cursor position is in thedate and time areas (step G92).

If a cursor position is in the date and time area, it is determinedwhich the date and time area is, a start date and time area or an enddate and time area (step G93). If the cursor position is in the startdate and time area, a character cursor is set at the start date and timearea (step G94). On the other hand, if a cursor position is in the enddate and time area, a character cursor is set at the end date and timearea (step G95). After the character cursor position is moved, programflow goes to step G89 and a movement of the mouse 6 is checked.

At step G91, if the mouse 6 has not been clicked, program goes to a flowof FIG. 79 and it is determined whether or not data input has been madefrom the keyboard 4 (step G96). If the data input has been made, it isdetermined whether or not a character cursor position is in the startdate and time area (step G97). If the character cursor position is thisposition, the data of the start date and time input in the start dateand time area are displayed (step G98) and the data of the start dateand time are stored in RAM 3 (step G99). Then, a character cursor ismoved (step G100).

At step G97, if a character cursor is not in the start date and timearea, it is determined whether or not the character cursor is an enddate and time position (step G101). If the character cursor position isthis position, the data of the end date and time input in the end dateand time area are displayed (step G102) and the data of the end date andtime are stored in RAM 3 (step G103). Then, the character cursor ismoved (step G100).

After the character cursor is moved at step G100, or if the data inputhas not made at step G96 or if a character cursor position is not anyone of the start date and time, and end date and time positions at stepsG97 and G101, program flow goes to step G89 of FIG. 78 and a movement ofthe mouse 6 is checked.

At step G92 of FIG. 78, if a cursor position is not in the date and timeareas, program flow does to a flow of FIG. 80 and it is determinedwhether or not a cursor position is a mail creation switch position onthe screen image of FIG. 81 (step G104). If the cursor position is thisposition, it is determined which the mail creation switch is, a fixedform mail “A” creation switch, a fixed form mail “B” creation switch, ora response designated mail creation switch (step G105).

If a cursor position is the fixed form mail “A” creation switch, a fixedform mail “A” creation processing is executed (step G106). The fixedform mail “A” creation processing is the same as the flow of the thirdembodiment shown in FIG. 44 and a fixed form mail “A” screen image isalso the same as the screen image of FIG. 45A. Then a content of a mailbuffer is stored in the fixed form mail “A” area of RAM 3 (step G107).If a cursor position is a mail “B” creation switch position, a fixedform mail “B” creation processing is executed (step G108). The fixedform mail “B” creation processing is the same as the flow of the thirdembodiment shown in FIG. 44 and a fixed mail “B” screen image is alsothe same as the screen image of FIG. 45B. Then, a content of a mailbuffer is stored in the fixed form mail “B” area of RAM 3 (step G109).If the cursor position is a response mail switch position, request forchange of response mail creation processing is executed (step G110).Then, a content of the mail creation area is stored in the request forchange of response date and time mail area of RAM 3 (step G111). After acontent of the mail creation area is stored at step G107, G109 or G111,program flow goes to step G89 of FIG. 78 and a movement of the mouse 6is checked.

At step G104, if a cursor position is not any one of the mail creationareas, it is determined whether or not the cursor position is one of theother switch positions of a screen image of FIG. 81 (step G112). If acursor position is the one of the other switch positions, it isdetermined which the cursor position is, an OK switch position or acancel switch position (step G113). If the cursor position is the OKswitch position, the definite flag KAKUTEIF is set at “1” (step G114)and the absence setting processing screen image of FIG. 81 is cleared(step G115). Then the flow is terminated.

If a cursor position is a cancel switch position at step G113, thedefinite flag KAKUTEIF is reset at “0” (step G116) and the mail creationarea of RAM 3 is cleared (step G117). In addition, the fixed form mail“A”, the fixed form mail “B” and the request for change of response dateand time mail areas of RAM 3 are cleared (step G118) and the absencesetting processing screen image of FIG. 81 is cleared (step G115). Then,the flow is terminated.

If a cursor position is not any one of the other switch positions atstep of G112, that is, if a cursor position is not any one of theabove-mentioned positions, program flow goes to step G89 of FIG. 78 anda movement of the mouse 6 is checked.

FIGS. 82 to 84 are flows of request for change of response mail creationprocessing at step G110 of FIG. 80 and FIG. 85 is a display screen imageof the request for change of response mail. The screen image comprises,as input areas, an address area, a subject area, a text area and aresponse date and time area. In addition, the screen image furthercomprises an OK switch, a cancel switch and a password switch.

In FIG. 82, at first, a transmitter address of the mail creation area isset as a self-address (step G119). Then, a frame screen image forrequest for change of response mail creation is displayed (step G120).Then, a cursor for the mouse 6 is displayed (step G121) and a charactercursor is displayed in the subject area (step G122).

Then, it is determined whether or not the mouse 6 has been moved (stepG123) and if the mouse 6 has been moved, a cursor position on the screenimage is moved in accordance with the movement (step G124). Then, it isdetermined whether or not the mouse 6 has been clicked (step G125). Ifthe mouse 6 has been clicked, it is determined whether or not a cursorposition is in an input area of the screen image of FIG. 85 (step G126).If a cursor position is in the input area, it is further determinedwhich position in input areas the cursor position is (step G127).

If a cursor position is a position in the subject area, a charactercursor is set at the subject area (step G128). If a cursor position is aposition in the text area, a character cursor is set at the text area(step G129). If a cursor position is a position in the response date andtime area, a character cursor is set at the response date and time area(step G130). After a character cursor is set, program goes to step G123and a movement of the mouse 6 is checked.

If the mouse 6 has not clicked at G125, program goes to a flow of FIG.83 and it is determined whether or not data input has been made from thekey board 4 (step G131). If the data input has been made, it isdetermined which position in input areas a character cursor position is(step G132). If the character cursor position is in the subject area,data are input in the subject area of the mail creation area of RAM 3(step G133) and the data are displayed in the subject area of a screenimage of FIG. 85 (step G134). If a character cursor position is in atext area, data are input in the text area of the mail creation area ofRAM 3 (step G135) and the data are displayed on a text area of thescreen image of FIG. 85 (step G136). If a character cursor position isin the response date and time area, data are input in the response dateand time area of the mail creation area of RAM 3 (step G137) and thedata are displayed in the response date and time area of the screenimage of FIG. 85 (step G138).

After the data are displayed in the subject area at step G134, or afterthe data are displayed in the text area at step G136, it is determinedwhether or not the flag PASF of RAM 3 is “1” (step G139). If the flagPASF is “1”, password data are input in the password area of RAM 3 (stepG140) and an input character, that is a character of the password isdisplayed in reverse (step G141). After the display in reverse, acharacter cursor is moved (step G142). If the flag PASF is “0” at step139, program goes to step G142 and the character cursor is moved sincethe input character is not the password. Since a character displayed inthe response date and time area is not a password, program flow goes tostep G142 and the character cursor is moved without determination on theflag of step G139 after the data are displayed at step G138. After themovement of the character cursor, program flow goes to step G123 of FIG.82 and the mouse 6 is checked.

If a character cursor position is not in the input area at step G126 ofFIG. 82, program flow goes to a flow of FIG. 84 and it is determinedwhether or not the cursor position is one of the icon switches of FIG.85 (step G143). If a cursor position is the one of the icon switches, itis determined which switch the cursor position is (step G144). If acursor position is a password switch, the flag PASF of RAM 3 is inverted(step F145). Then, program flow goes to step G123 of FIG. 82 and amovement of the mouse 6 is checked.

If a cursor position is the cancel switch, the mail creation area of RAM3 is cleared (step G146) and the password area is cleared (step G147).Then, the flag PASF of RAM 3 is reset at “0” (step G148) and a displayof the screen image of FIG. 85 is cleared (step G149). If a cursorposition is the OK switch at step G144, the flag PASF of RAM 3 is resetat “0” (step G148) and the display of the screen image of FIG. 85 iscleared (step G 149). After the display is cleared at step G149, theflow is terminated.

FIGS. 86 to 89 are flow charts of timer interrupt processing.

When timer interrupts occur at set intervals, the server 300 shown inFIG. 1 is accessed by CPU 1 of a terminal 100. In FIG. 86, it isdetermined whether or not a received mail is present in a mail box ofthe server 300 (step G150). If the received mail is not present, theflow is immediately terminated. If the received mail is present, a point“n” indicating the area numbers of MAIL(1) to MAIL(M) of the receivedmail storage area of RAM 3 is set at “1” (step G151). Then, it isdetermined whether or not an area of a RECEIVED MAIL(n) area designatedby “n” is empty (step G152).

In other words, if the RECEIVED MAIL(n) area is not empty, “n” isincremented (step G153) and it is determined whether or not “n” exceedsthe maximum number (step G154). If “n” has not exceeded the maximumnumber, program goes to step G152 and it is determined whether or notthe RECEIVED MAIL(n) area is empty. A loop of steps G152, G153 and G154is repeated to search a RECEIVED MAIL(n) area with an empty space. Atstep G154, if “n” exceeds the maximum number, that is when none of theMAIL(1) to MAIL(M) of the received mail storage area of RAM 3 is empty,a received mail with the oldest reception data and time is searched(step G155). Then, the pointer “n” is set at a mail number thereof (stepG156).

If the designated RECEIVED MAIL(n) area is empty at step G152 or if “n”is set at the mail number with the oldest reception date and time atstep G155, a received mail fetched from the server 300 is stored in theRECEIVED MAIL(n) area (step G156). Then, an unseal flag KAIFUF(n) isreset at “0” in order to indicate the sealed state (step G157) andTIME(n) is set at the reception date and time (step G158). Then it isdetermined whether or not the definite flag KAKUTEIF which is set in theabsence setting processing of FIG. 80 is “0” (step G159).

If the definite flag KAITEIF is “0”, the flow is terminated since anabsence setting processing is not executed. If the flag is “1”, theabsence setting processing has been executed. In this case, program goesto a flow of FIG. 87 and it is determined whether or not the receptiondate and time at which TIME is set is in the period of a start date andtime to an end date and time (step G160). In other words, it isdetermined whether or not a received mail is a received mail received inan absent period. If the received mail is not in the period, the flow isterminated, but when the received mail is in the period, it isdetermined whether or not the response flag HESINF of the received mailstorage area of RAM 3 is “1”, that is it is determined whether or not aRECEIVED MAIL(n) is a response designated mail (step G161). If theHESINF is “1”, a pointer “k” is set at “1” (step G162). The pointer “k”is the number of WAITING ADDRESS(1) to WAITING ADDRESS(M) in a waitingaddress area of RAM 3 shown in FIG. 68. Then, the ADDRESS(k) isretrieved while “k” is incremented.

In this retrieval, it is determined whether or not the WAITINGADDRESS(k) coincides with a transmitter address of a RECEIVED MAIL(n)(step G163). If there is no coincidence therebetween, program flow goesto a flow of FIG. 88, “k” is incremented (step G164) and it isdetermined whether or not “k” exceeds the maximum number (step G165). If“k” has not exceeded the maximum number, program flow goes to step G163and it is determined whether or not a WAITING ADDRESS(k) coincides witha transmitter address of a RECEIVED MAIL(n). Then a loop of steps G163,G164 and G165 is repeated to search the WAITING ADDRESS(k) incoincidence.

At step G165 of FIG. 88, if “k” exceeds the maximum number, that is whenthere is no waiting address in coincidence, since the received mail is amail to which no response is transmitted, a transmitter address of theRECEIVED MAIL(n) and the number of the RECEIVED MAIL(n) is notregistered in a waiting address area and a waiting mail number area ofRAM 3 shown in FIG. 68. In this case, a new pointer “p” indicating anumber of a waiting address is set at “1” (step G166) and it isdetermined whether or not the WAITING ADDRESS(p) is empty while p isincremented (step G167). If the WAITING ADDRESS(p) is not empty, “p” isincremented (step G168) and it is determined whether or not “p” exceedsthe maximum number (step G169). If “p” has not exceeded the maximumnumber, program flow goes to step G167 and it is determined whether ornot the WAITING ADDRESS(p) area is empty. Then, a loop of steps G167,G168 and G169 is repeated to search a WAITING ADDRESS(p) with an emptyspace.

If there is available a WAITING ADDRESS(p) with an empty space at stepG167, the WAITING ADDRESS(p) is set as a transmitter address of thereceived mail (step G170). The WAITING ADDRESS NUMBER(p) correspondingto the WAITING ADDRESS(p) is set at “n” (step G171). Then, an address ofthe RECEIVED MAIL(n) is used as a receiver address of a request forchange of response mail (step G172). Thereafter, a request for change ofresponse mail shown in FIG. 85 is transmitted (step G173). Then, it isdetermined whether or not the transmission has been completed (stepG174) and if the transmission has not been completed, transmittingprocessing is continued and if the transmission has been completed, theflow is terminated.

If “p” exceeds the maximum number at step G169, that is, if none of theareas of the WAITING ADDRESS(1) to WAITING ADDRESS(M) is empty, atransmitter address of a RECEIVED MAIL(n) is used as a receiver addressof a fixed form mail “B” (step G175). In other words, since there is noavailable area with an empty space for a response, the transmitteraddress is used as an address of a fixed form mail “B” indicating anemergency contact place shown in FIG. 45B. Then, the fixed form mail “B”is transmitted (step G176) and it is determined whether or not thetransmission has been completed (step G177). If the transmission has notbeen completed, transmitting processing of step G176 is continued. Ifthe transmission has been completed, the flow is terminated.

If the WAITING ADDRESS(k) coincides with a transmitter address of aRECEIVED MAIL(n) at step G163 of FIG. 87, since the RECEIVED MAIL(n) isthe second received mail with response date and time designation fromthe same transmitter who responds to a response mail to the previousreceived mail, it is further considered that a response date and timehas been changed. Therefore, it is determined whether or not a responsedate and time of the RECEIVED MAIL(n) is in the period of a start dateand time to an end date and time in the absence (step G178). If therespond date and time is not in the period, since a response date andtime has been changed, a point “m” is set at a WAITING MAIL NUMBER(k)(step G179) and the response date and time of the first RECEIVED MAIL(m)is changed to a response date and time of the second RECEIVED MAIL(n)(step G180). Then, the second RECEIVED MAIL(n) is deleted from thereceived mail storage area of RAM 3 (step G181) and the received mailarea is sorted (step G182). The WAITING ADDRESS(k) is also deleted (stepG183), the WAITING MAIL NUMBER(k) is deleted (step G184) and the waitingaddress area and the waiting mail number area are rearranged to acondition with no interposed empty areas (step G185). Then, the flow isterminated.

At step G178, if a response designating date and time of the secondRECEIVED MAIL(n) also is in the period of a start date and time to anend date and time in the absence, this means that a transmitter of theRECEIVED MAIL(n) refuses a change of a response designating date andtime. For this reason, a transmitter address of the RECEIVED MAIL(n) isset as an receiver address of a fixed form mail “B” clearly indicatingan emergency contact place (step G186) and the fixed form mail “B” istransmitted (step G187). Then, it is determined whether or not thetransmission has been completed (step G188) and if the transmission hasnot been completed, transmitting processing of step G187 is continued.If the transmission has been completed, the flow is terminated.

At step G161 of FIG. 87, if the HENSINF(n) is “0”, a RECEIVED MAIL(n) isan ordinary mail which is not designated with a response date and timeor a received mail responding to a request for change of response mailshown in FIG. 85 which is transmitted to a received mail with a responsedesignating date and time. In this case, program flow goes to a flow ofFIG. 89 and a pointer “k” is set at “1” (step G189). Then, it isdetermined whether or not a WAITING ADDRESS(k) coincides with atransmitter address of a RECEIVED MAIL(n) while “k” is incremented (stepG190). If there is no available coincidence therebetween, “k” isincremented (step G191) and it is determined whether or not “k” exceedsthe maximum number (step G192). If “k” has not exceeded the maximumnumber, program flow goes to step G190 and it is determined whether ornot a WAITING ADDRESS(k) coincides with a transmitter address of aRECEIVED MAIL(n). Then, a loop of steps G190, G191 and G192 is repeatedto search an address in coincidence.

If “k” exceeds the maximum number at step G192, that is when there is noavailable address in coincidence therebetween, a RECEIVED MAIL(n) is anordinary mail. In this case, a transmitter address of the RECEIVEDMAIL(n) is set as a receiver address of a fixed form mail “A” (stepG193). In other words, the transmitter address is used as a receiveraddress of a fixed form mail “A” which clearly indicates the state ofabsence shown in FIG. 45A. Then, the fixed form mail “A” is transmitted(step G194) and it is determined whether or not the transmission hasbeen completed (step G195). If the transmission has not been completed,transmitting processing of step G194 is continued. If the transmissionhas been completed, the flow is terminated.

At step G190, if there is available a WAITING ADDRESS(k) which coincideswith a transmitter address of a RECEIVED MAIL(n), the RECEIVED MAIL(n)is a received mail which responds to a request for change of responsemail. In this case, a WAITING MAIL NUMBER(k) is set at “n” (step G196).Then, it is determined whether or not, in a subject area or in a textarea of the RECEIVED MAIL(n), there is available a password(identification information) which coincides with a password(Identification information) input in the password area of RAM 3 at stepG140 of FIG. 83 (step G197). If there is available a password incoincidence therebetween, since this means that a transmitter of theRECEIVED MAIL(n) has accepted a change of response designating date andtime, a response designating date and time of the RECEIVED MAIL(n) whichas at first been designated with the response designating date and timeis changed to a response designating date and time of a request forchange of response mail (step G198). Then, the RECEIVED MAIL(n) isdeleted (step G199) and the received mail storage area of RAM 3 issorted (step G200). The WAITING ADDRESS(k) is also deleted (step G201)and the WAITING MAIL NUMBER(k) is deleted (step G202). Then, the flow isterminated.

At step G196, if the password is not available, since this means thatthe transmitter of the RECEIVED MAIL(n) has refused the change ofresponse designating date and time, an address of the RECEIVED MAIL(n)is designated as a receiver address of a fixed form mail “B” clearlyindicating an emergency contact place (step G203). then the fixed formmail “B” is transmitted (step G204) and it is determined whether or notthe transmission has been completed (step G205). If the transmission hasnot been completed, the transmission processing of step G203 iscontinued. If the transmission has been completed, the RECEIVED MAIL(n)is deleted (step G199) and the received mail storage area of RAM 3 issorted (step G200). Then, the WAITING ADDRESS(k) is deleted (step G201)and the WAITING MAIL NUMBER(k) is deleted (step G202). Then the flow isterminated.

As described above, according to the above mentioned seventh embodiment,the terminal of FIG. 1 comprises:

mail receiving means for receiving an electronic mail;

date and time setting means for setting a specific period of time;

reception date and time determining means for determining whether or notthe electronic mail is received during the specific period of time bythe mail receiving means;

mail determining means for determining whether or not the electronicmail which is determined to be received during the specific period oftime by the reception date and time determining means is a response dateand time designated mail which designates the response date and time;

response date and time determining means for determining whether or notthe response date and time is in the specific period of time when theelectronic mail is determined to be the response date and timedesignated mail by the mail determining means; and

mail transmitting means for transmitting a response mail requesting fora change of the response date and time to a different response data andtime except the specific period of time when the response date and timewhich is determined by the response date and time determining means isin the specific period of time.

If an electronic mail which designates a response date and time in aspecific period of time is received, a response mail requesting for achange of the response date and time to a different response date andtime except the specific period of time is transmitted.

In the above-mentioned seventh embodiment, there is described anelectronic mail system in which a program to receive and transmitelectronic mails is stored in ROM 2, but such constitutions may beadopted that a program to transmit or receive an electronic mail isstored in such media as a floppy disk, a compact disk and the like andan apparatus such as a personal computer or a word processor for generalpurpose use, or the like executes the program.

The machine readable storage medium stores a program for electronic mailprocessing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of setting a specific period of time;

(iii) step of determining whether or not the electronic mail is receivedduring the specific period of time;

(iv) step of determining whether or not an electronic mail is receivedduring the specific period of time is a response date and timedesignated mail which designates the response date and time;

(v) step of determining whether or not the response date and timedesignated by the response date and time designated mail is in thespecific period of time; and

(vi) step of transmitting a response mail requesting for a change of theresponse date and time to a different response data and time except thespecific period of time when the response date and time is in thespecific period of time.

The program is executed by an apparatus such as a personal computer or aword processor for general purpose use, or the like.

Next, the eighth embodiment will be described.

FIG. 90 is a memory map of RAM 3 in the eighth embodiment. As shown inthe figure, the following areas are the same as in the seventhembodiment shown in FIG. 68: a mail creation area, an address area, areceived mail storage area, and areas of a request for change ofresponse date and time mail, a waiting mail number, a password, a flagPASF, and a start date and time and an end date and time in an absentperiod. However, a single kind of fixed form mail is available in theeighth embodiment and a fixed form mail is stored in a fixed form mailarea. In addition, there are provided an area to store a plurality ofWAITING MAIL(1) to WAITING MAIL(L), an area to store a plurality ofWAITING MAIL NUMBER(1) to NUMBER(L) and a transfer mail address area fortransferring a received mail in an absent period to an address of aportable terminal carried by a receiver on the road. Still in addition,a register “TM” area which is used in creation of a transfer mail.

Then, while operations of the eighth embodiment will be described, theoperations are the same as those of the first embodiment only exceptabsence setting processing and timer interrupt processing duringreception display processing and therefore, figures and description willbe omitted.

FIGS. 91 to 93 are flows of absence setting processing and FIG. 94 showsan absence setting processing screen image. In FIG. 91, the absencesetting processing screen image of FIG. 94 is displayed (step H1) and acharacter cursor is set at the start date and time area (step H2). Then,a cursor for the mouse 6 is displayed (step H3). Then, it is determinedwhether or not the mouse 6 has been moved (step H4) and if the mouse 6has been moved, the cursor is moved in accordance with the movement(step H5). Then, it is determined whether or not the mouse 6 has beenclicked (step H6). If the mouse 6 has been clicked, it is determinedwhether or not a cursor position is in a date and time area (step H7).

If a cursor position is in the date and time area, it is determinedwhich the date and time area is, the start date and time area or the enddate and time area (step H8). If the date and time area is the startdate and time area, a character cursor is set at the start date and timearea (step H9). On the other hand, if a cursor position is in the enddate and time area, a character cursor is set at the end date and timearea (step H10). After the character cursor position is moved, programflow goes to step H4 and a movement of the mouse 6 is checked.

At step H6, if the mouse 6 has not been clicked, program flow goes to aflow of FIG. 92 and it is determined whether or not data input has beenmade from the key board 4 (step H12). If the date input has been made,it is determined whether or not a character cursor is in the start dateand time area (step H13). If the character cursor position is thisposition, the data of the start date and time input in the start dateand time area are displayed (step H14) and the data of the start dateand time are stored in RAM 3 (step H15). Then, the character cursor ismoved (step H16).

At step H13, if a character cursor position is not the start date andtime position, it is determined whether or not the character cursorposition is the end date and time position (step H17). If the charactercursor position is this position, the data of the end date and timeinput in the end date and time area are displayed (step H18) and thedata of the end date and time are stored in RAM 3 (step H19). Then, thecharacter cursor is moved (step H16).

After the character cursor is moved at step H16, or if the data inputhas not been made at step H12, or if the character cursor position isnot any one of the start date and time and end date and time positionsat steps H13 and H17, program flow goes to step H4 of FIG. 91 and amovement of the mouse 6 is checked.

At step H7 of FIG. 91, if a cursor position is not in the date and timearea, program flow goes to a flow of FIG. 93 and processing is executedaccording to at which icon switch positions of the screen image of FIG.94 the character cursor position is. It is determined whether or not acursor position is at a mail creation switch (step H20) and if thecursor position is this position, fixed form mail creation processing isexecuted (step H21). The fixed form mail creation processing is the sameas the flow of the first embodiment shown in FIGS. 20 and 21, and afixed form mail screen image is also the same as the screen image shownin FIG. 24A. After the fixed form mail creation processing, a content ofthe mail creation area of RAM 3 is stored in the fixed form mail area(step H22).

At step H20, if a character cursor position is not at the mail creationswitch, it is determined whether or not the character cursor position isat a response date and time mail creation switch (step H23). If thecharacter cursor position is this position, a request for change ofresponse mail creation processing is executed (step H24). The requestfor a change of response mail creation processing is the same as theflow of the seventh embodiment shown in FIGS. 82 to 84. After therequest for change of response mail creation processing, a content ofthe mail creation area of RAM 3 is stored in a response designation area(step H25).

At step H23, if a character cursor position is not at the response dateand time mail creation switch, it is determined whether or not thecharacter cursor position is at a transfer address input switch (stepH26). If the character cursor position is this position, transferaddress input processing is executed (step H27). The transfer addressinput processing is the same as the flow of the second embodiment shownin FIGS. 31 to 33.

At step H26, if a character cursor position is not at the transferaddress input switch, it is determined whether or not the charactercursor position is at any one of the other switches (step H28). If thecharacter cursor position is at one of the other switches, it isdetermined whether or not the one of the other switches is an OK switch(step H29). If the one of the other switches is the OK switch, adefinite flag KAKUTEIF is set at “1” (step H30) and a display of theabsence setting processing screen image is cleared (step H31). Then, theflow is terminated.

At step H29, if a character cursor position is not at the OK switch,KAKUTEIF is reset at “0” (step H32), the mail creation area of RAM 3 iscleared (step F33), the fixed form mail area is cleared (step H34) and atransfer address area is cleared (step H35) since the character cursorposition is at an erase switch. Then, the flow is terminated.

At either step H22 or step H25, after a content of the mail creationarea is stored in a corresponding area, or after the transfer addressinput processing is completed, or at step H28, if a character cursorposition is not at any one of the other switches, program flow goes tostep H4 of FIG. 91 and a movement of the mouse 6 is checked.

FIGS. 95 to 99 are flows of timer interrupt processing.

When timer interrupts occur at set intervals, the server 300 shown inFIG. 1 is accessed by CPU 1 of a terminal 100. In FIG. 95, it isdetermined whether or not a received mail is present in a mail box ofthe server 300 (step H36). If the received mail is not present, the flowis immediately terminated. If the received mail is present, a pointer“n” indicating the area number of MAIL(1) to MAIL(N) of the receivedmail storage area of RAM 3 is set at “1” (step F31). Then, it isdetermined whether or not a RECEIVED MAIL(n) area designated by “n” isempty (step H38).

In other words, if the RECEIVED MAIL(n) area is not empty, “n” isincremented (step H39) and it is determined whether or not “n” exceedsthe maximum number (step H40). If “n” has not exceeded the maximumnumber, program flow goes to step H38 and it is determined whether ornot the RECEIVED MAIL(n) area is empty. A loop of steps H38, H39 and H40is repeated while “n” is incremented to search a RECEIVED MAIL(n) areawith an empty space. At step H40, if “n” exceeds the maximum number,that is when none of the RECEIVED MAIL(1) to RECEIVED MAIL(N) of thereceived mail storage area of RAM 3 is empty, a received mail with theoldest reception data and time is searched and the pointer “n” is set atthe mail number (step H41).

If a designated RECEIVED MAIL(n) area is empty at step H38 or if “n” isset at a mail number of the oldest reception date and time at step H41,a received mail fetched from the server 300 is stored in the RECEIVEDMAIL(n) area (step H42). Then, an unseal flag KAIFUF(n) is reset at “0”in order to indicate the seal state (step H43) and TIME(n) is set at areception date and time (step H44). Then, it is determined whether ornot the definite flag KAKUTEIF which is set in absence settingprocessing of FIG. 93 is “0”(step H45).

If the definite flag KAKUTEIF is “0”, since an absence settingprocessing has not been executed, the flow is terminated. If the flag is“1”, since the absence setting processing has been executed, programflow goes to a flow of FIG. 96 and it is determined whether or not thereception date and time at which the TIME(n) is set is in an absentperiod from a start date and time to an end date and time (step H46). Inother words, it is determined whether or not a received mail is areceived mail received in the absent period. If the received mail hasnot been received in the absent period, the flow is terminated, but whenthe received mail receives in the absent period, it is determinedwhether or not the response flag HENSINF in the received mail storagearea of RAM 3 is “1”, that is, it is determined whether or not theRECEIVED MAIL(n) is a response designated mail (step H47). If theresponse flag HENSINF is “1”, a pointer “k” is set at “1” (step H48).The pointer “k” is a number of WAITING MAIL(1) to WAITING MAIL(K) of RAM3 shown in FIG. 90. Then, a WAITING MAIL(k) is retrieved, while “k” isincremented.

In this retrieval, it is determined whether or not a WAITING MAIL(k)coincides with a transmitter address of a RECEIVED MAIL(n) (step H49).If the WAITING MAIL(k) does not coincide with the transmitter address ofa RECEIVED MAIL(n), program flow goes to a flow of FIG. 97 and “k” isincremented (step H50) and it is determined whether or not “k” exceedsthe maximum number (step H51). If “k” has not exceeded the maximumnumber, program flow goes to step H49 of FIG. 96 and it is determinedwhether or not the WAITING MAIL(k) coincides with the transmitteraddress of the RECEIVED MAIL(n). Then, a loop of steps H49, H50 and H51is repeated to search the WAITING MAIL(k) in coincidence.

At step H51 of FIG. 97, if “k” exceeds the maximum number, that is whenno waiting mail in coincidence is available, since the RECEIVED MAIL(n)has not been responded by a response mail, the RECEIVED MAIL(n) and theRECEIVED MAIL NUMNER(n) are not registered in either a waiting mail areaor a waiting mail number area of RAM 3 shown in FIG. 90. In this case, anew pointer “p” indicating a waiting mail number is set at “1” (stepH52) and it is determined whether or not a WAITING MAIL(p) is empty,while “p” is incremented (step H53). If a WAITING MAIL(p) is not empty,“p” is incremented (step H54) and it is determined whether or not “p”exceeds the maximum number (step H55). If “p” has not exceeded themaximum number, program goes to step H53 and it is determined whether aWAITING ADDRESS(p) area is empty. Then, a loop of steps H53, H54 and H55is repeated to search a WAITING ADDRESS(p) with an empty space.

At step H53, if a WAITING ADDRESS(p) with an empty area is available,the WAITING MAIL(p) is set at a RECEIVED MAIL(n) (step H56). Then, aWAITING MAIL NUMBER(p) corresponding to the WAITING MAIL(p) is set at“n” in a waiting mail number area of RAM 3 (step H57). Then, an addressof the received mail is designated as a receiver address of a requestfor change of response mail (step H58). Thereafter, the same mail as therequest for change of response mail in the seventh embodiment shown inFIG. 85 is transmitted (step H59). Then, it is determined whether or notthe transmission has been completed (step H60) and if the transmissionhas not been completed, the transmission processing of step H59 iscontinued and if the transmission has been completed, the flow isterminated.

At step H55, if “p” exceeds the maximum number, that is when none ofWAITING ADDRESS(1) to WAITING ADDRESS(M) is empty, the register “TM” isset at 2 (step H61) and transfer mail creation processing is executed(step H62). Then, a transfer mail is transmitted (step H63) and it isdetermined whether or not the transmission has been completed (stepH64). If the transmission has not been completed, the transmissionprocessing of step H63 is continued. If the transmission has beencompleted, the flow is terminated.

At step H49 of FIG. 96, if a WAITING MAIL(k) and a transmitter addressof RECEIVED MAIL(n) coincide with each other, since the RECEIVED MAIL(n)is a second response date and time designated mail from the sametransmitter who has responded to a response mail responding to theprevious received mail, a change of the response date and time isconceivable. Therefore, it is determined whether or not a responsedesignating date and time of the RECEIVED MAIL(n) is in a period betweena start date and time and an end date and time in the absence (stepH65). If the response date and time is not in the period, since theresponse date and time has been changed, a pointer “m” is set at aWAITING MAIL NUMBER(k) (step H66) and the response date and time of theRECEIVED MAIL(m) which is received in the first place is changed to aresponse date and time of the second RECEIVED MAIL(n) (step H67). Then,the RECEIVED MAIL(n) is deleted from the received mail storage area ofRAM 3 (step H68) and a received mail area is sorted (step H69). Then,the WAITING MAIL(k) is deleted (step H70), the WAITING MAIL NUMBER(k) isdeleted (step H71) and the waiting mail and the waiting mail numberareas are rearranged Then, the flow is terminated.

At step H65, if the response designating date and time of the secondRECEIVED MAIL(n) is also in the period between a start date and time andan end date and time in the absence, this means that a transmitter ofthe second RECEIVED MAIL(n) refuses a change of the response date andtime to a date and time except the period. In this case, the register“TM” is set at “1” (step H73) and transfer mail creation processing isexecuted (step H74). The transfer mail creation processing is furtherdescribed later. Then, a transfer mail is transmitted (step H75). Then,it is determined whether or not the transmission has been completed(step H76) and if the transmission has not been completed, thetransmission processing of step H75 is continued. If the transmissionhas been completed, the flow is terminated.

At step H47 of FIG. 96, if HENSINF(n) is “0”, a RECEIVED MAIL(n) is anordinary MAIL(n) which does not designate a date and time or a receivedmail responding to the same request for change of response as that inthe seventh embodiment shown in FIG. 85 which has been transmittedresponding to the received date and time designated mail. In this case,program flow goes to a flow of FIG. 98 and a point “k” is set at “1”(step H77). Then, it is determined whether or not a WAITING MAIL(k) anda transmitter address of a RECEIVED MAIL(n) coincide with each otherwhile “k” is incremented (step H78). If there is no coincidencetherebetween, “k” is incremented (step H79) and it is determined whetheror not “k” exceeds the maximum number (step H80). If “k” has notexceeded the maximum number, program goes to step H78 and it isdetermined whether or not a WAITING MAIL(k) and a transmitter address ofa RECEIVED MAIL(n) coincide with each other. Then, a loop of steps H78,H79 and H80 is repeated to search an address in coincidence.

At step H80, if “k” exceeds the maximum number, that is when there is noaddress in coincidence therebetween, the RECEIVED MAIL(n) is an ordinaryMAIL(n). In this case, a transmitter address of the RECEIVED MAIL(n) isdesignated as a receiver address of a fixed form mail “A” (step H81). Inother words, the transmitter address is designated as a receiver addressof a fixed form mail “A” which clearly indicates the state of absenceshown in FIG. 45A. Then, the fixed form mail “A” is transmitted (stepH82) and it is determined whether or not the transmission has beencompleted (step H83). If the transmission has not been completed, thetransmission processing of step H82 is continued. If the transmissionhas been completed, the flow is terminated.

At step H78, if there is available a WAITING MAIL(k) which coincideswith a transmitter address of a RECEIVED MAIL(n), the RECEIVED MAIL(n)is a received mail which responds to a request for change of responsemail. In this case, a WAITING MAIL NUMBER(k) corresponding to theWAITING MAIL(k) is set at “n” (step H84). Then, it is determined whetheror not, in a subject area or a text area of a RECEIVED MAIL(n), there isavailable a password (identification information) corresponding to apassword (identification information) input in the password area of RAM3 (step H85). If there is available a password in coincidence, sincethis means that a transmitter of the RECEIVED MAIL(n) accepts a changeof a response designating date and time, the response date and time ofthe RECEIVED MAIL(n) which was designated in the first place is changedto a response designating date and time of the request for change ofdate and time mail (step H86). Then, the RECEIVED MAIL(n) is deleted(step H87) and the received mail storage area of RAM 3 is sorted (stepH88). Then, the WAITING MAIL(k) is deleted (step H89) and a WAITING MAILNUMBER(k) is deleted (step H90). Then, the flow is terminated.

At step H85, if a password is not available, this means that atransmitter refuses a change of response designating date and time. Inthis case, the register “TM” is set at 3 (step H91) and transfer mailcreation processing is executed (step H92). Then, a transfer mail istransmitted (step H93) and it is determined whether or not thetransmission has been completed (step H94). If the transmission has notbeen completed, the transmission processing of step H93 is continued. Ifthe transmission has been completed, the RECEIVED MAIL(n) is deleted(step H87) and the received mail storage area of RAM 3 is sorted (stepH88). The WAITING MAIL(k) is deleted (step H89) and the WAITING MAILNUMBER(k) is deleted (step H90). Then the flow is terminated.

FIG. 99 is a flow of transfer mail creation processing at step H74 ofFIG. 96, at step H62 of FIG. 97 and at step H92 of FIG. 98. At first, atransfer mail address is stored in an address area of the mail creationarea of RAM 3 (step H95). Then a value of TM is determined (step H96).

If a value of TM is 1, a subject of a WAITING MAIL(k) is stored in asubject area of the mail creation area (step H97) and texts of theWAITING MAIL(k) and a RECEIVED MAIL(n) are stored in a text input areaof the mail creation area (step H98). If a value of TM is 2, the subjectof the RECEIVED MAIL(n) is stored in the subject area of the mailcreation area (step H99) and the text of the RECEIVED MAIL(n) is storedin a text input area of the of the mail creation area (step H100). If avalue of TM is 3, the subject of the WAITING MAIL(k) is stored in thesubject input area of the mail creation area (step H101) and the text ofthe WAITING MAIL(k) is stored in a text input area of the mail creationarea (step H102).

At steps H98, H100 and H102, after the text is stored, a value of TM isset at “0” (step H103). Then, the flow is terminated.

As described above, according to the above mentioned eighth embodiment,the terminal 100 of FIG. 1 comprises:

mail receiving means for receiving an electronic mail;

date and time setting means for setting a specific period of time;

reception date and time determining means for determining whether or notthe electronic mail is received during the specific period of time bythe mail receiving means;

mail determining means for determining whether or not the electronicmail which is determined to be received during the specific period oftime by the reception date and time determining means is a response dateand time designated mail which designates the response date and time;

response date and time determining means for determining whether or notthe response date and time is in the specific period of time when theelectronic mail is determined to be the response date and timedesignated mail by the mail determining means;

mail transmitting means for transmitting a request for a change mailrequesting for a change in the response date and time to a differentresponse data and time except the specific period of time when theresponse date and time which is determined by the response date and timedetermining means is in the specific period of time;

date and time changing means for changing the response date and time ofthe response date and time designated mail when the mail receiving meansreceives a response mail which indicates acceptance of the request forchange after the request for change mail is transmitted by the mailtransmitting means; and

mail transfer means for transferring the response date and timedesignated mail to a predetermined address when the mail receiving meansreceives a response mail which refuses the request for change after therequest for change mail is transmitted by the mail transmitting means.

If a response date and time designated mail which designates theresponse date and time had been received during the specific period oftime, and if there is received a response mail which indicatesacceptance of a request for change of the response date and time to adifferent response date and time except a specific period of time afterthe request for change mail requesting for the change of the responsedate and time is transmitted, the response date and time is changed tothe different date and time or if there is received a response mailwhich refuses a request for change of the response date and time to adifferent response date and time except a specific period of time aftera request for change mail requesting for the change of the response dateand time is transmitted, the response date and time designated mail istransmitted to a designated address.

In the above-mentioned eighth embodiment, there is described anelectronic mail system in which a program to receive and transmitelectronic mails is stored in ROM 2, but such constitutions may beadopted that a program to transmit or receive an electronic mail isstored in such media as a floppy disk, a compact disk and the like andan apparatus such as a personal computer or a word processor for generalpurpose use, or the like executes the program.

The machine readable storage medium stores a program for electronic mailprocessing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of setting a specific period of time;

(iii) step of determining whether or not the electronic mail is receivedduring the specific period of time by the step (i);

(iv) step of determining whether or not the electronic mail which isdetermined to be received during the specific period of time by the step(iii) is a response date and time designated mail which designates theresponse date and time;

(v) step of determining whether or not the response date and time is inthe specific period of time when the electronic mail is determined to bethe response date and time designated mail by the step (iv);

(vi) step of transmitting a request for change mail requesting for achange in the response date and time to a different response data andtime except the specific period of time when the response date and timedetermined by the step (v) is in the specific period of time;

step (vii) of changing the response date and time of the response dateand time designated mail when the step (i) receives a response mailwhich indicates acceptance of the request for a change after the requestfor change mail is transmitted by the step (vi); and

step (viii) of transferring the response date and time designated mailto a predetermined address when the step (i) receives a response mailwhich refuses the request for change after the request for change mailis transmitted by the step (vi).

The program is executed by an apparatus such as a personal computer or aword processor for general purpose use, or the like.

Next, the ninth embodiment will be described.

FIG. 100 is a memory map of RAM 3 in the ninth embodiment. As shown inthe figure, the followings are the same as those of the firstembodiments or the like: a mail creation area, an address area, areceived mail storage area, and a start date and time and an end dateand time in an absent setting period. In the ninth embodiment, fourkinds of fixed form mails, that is fixed form mails “A”, “B”, “C” and“D”, are used and stored in respective areas.

The data of the fixed form mail “A” area, as shown in FIG. 101A,comprises a transmitter address, a receiver address, a subject and atext. The data of the fixed mail form “B” area, as shown in FIG. 101B,comprises a plurality of REGISTERED ADDRESS(1) to REGISTERED ADDRESS(L),a transmitter address, a receiver address, a subject and a text. Each ofthe REGISTERED ADDRESS(1) to REGISTERED ADDRESS(L) comprises data name,address and type.

The data of the fixed form mail “C” area, as shown in FIG. 102,comprises a plurality of PASSWORD(1) to PASSWORD(L) and MAIL(1) toMAIL(L) corresponding to the PASSWORD(1) to PASSWORD(L). Each of theMAIL(1) to MAIL(L) comprises a transmitter address, a receiver address,a subject and a text. The data of the fixed form mail “D” area, as shownin FIG. 103, comprises MAIL(1) to MAIL(L) and each of the mail datacomprises a password, a transmitter address, a receiver address asubject and a text.

The fixed form mails “A” to “D” are used as a mail responding to thetransmitter as an absence notice in an absent period. In other words, ifa mail is received when a terminal 100 in the state of absence is set,attributes of the received mail (for example, a transmitter address, ora password) are considered to select one of the four kinds of fixed formmails “A” to “D” as a response mail which responds to what is to beresponded and a selected fixed form mail is transmitted to thetransmitter. Thereby, an absence notice corresponding to a content ofthe received mail can automatically be transmitted. The selection of afixed form mail is described later.

Then, operations of the ninth embodiment is described. In receptiondisplay processing as a main flow, since a mail display processing, amail creation processing and an address input processing arerespectively the same as those of the first embodiment or the like,figures and description are omitted. In the ninth embodiment, absencesetting processing and timer interrupt processing (reception processing)in the reception display processing are different from the otherembodiments.

FIG. 104 is a flow of the absence setting processing. At first, at stepJ1, a absence setting screen image is displayed in the display section5. The absence setting screen image, as shown in FIG. 105, comprisesMAIL “A” to MAIL “D” creation switches each of which designates a kindof an absence notice, an OK switch which is clicked when the designationis confirmed and a cancel switch which is clicked when the designationis suspended.

The mail “A” creation switch is clicked when a fixed form mail iscreated under conditions that attributes of the received mail are notdesignated and a fixed form mails “A” (described later) to betransmitted in response to all received mails arrived in the state ofabsence are prepared. The mail “B” creation switch is clicked when afixed form mail “B” (described later) to be transmitted in response to adesignated address when a mail from a designated address is received inthe state of absence is created.

The mail “C” creation switch is clicked when a fixed form mail “C” to betransmitted in response when a mail including a designated password isreceived in the state of absence is created. The mail “D” creationswitch is clicked when a fixed form mail “D” (described later) to betransmitted in response only when a mail, which is a mail from adesignated address, and which includes the designated password, isreceived in the state of absence is created.

After such an absence setting screen image is displayed, CPU 1 advancesprogram flow to step J2 for processing and displays a cursorcorresponding to the mouse 6. Then at steps J3 and J4, the cursor ismoved and displayed in correspondence to a pointing operation of themouse 6 and at step J5 it is determined whether or not the mouse hasbeen clicked. Then when the mouse has been clicked, a determinationresult is YES, program flow goes to step J6 and to the following stepsand processing is executed in accordance with a position at whichclicking has done. The processings are described case by case.

If the mail “A” creation switch has been clicked, a determination resultat step J6 is YES, program flow goes to next step J7 for anotherprocessing and a fixed form mail “A” creation processing routinedescribed later is executed.

If the mail “B” creation switch has been clicked, program flow goes tostep J8 through step J6 and when a determination result here is YES,program flow goes to step J9 for another processing and a fixed formmail “B” creation routine described later is executed.

If the mail “C” creation switch has been clicked, program flow goes tostep J10 through steps J6 and J8 and when a determination result here isYES, program flow goes to step J11 for another processing and a fixedform mail “C” creation routine described later is executed.

If the mail “D” creation switch has been clicked, program flow goes tostep J12 through steps J6, J8, and J10 and when a determination resulthere is YES, program flow goes to step J13 for another processing and afixed form mail “D” creation routine described later is executed.

If the OK switch has been clicked for confirmation under condition whereone of the above mentioned mail creation switches had been clicked and akind of absence notice to be prepared had been designated and when adetermination result at step J14 is YES, program flow goes to step J15for another processing and not only is a screen image display of FIG.105 is cleared but the flag KAKUTEIF is set at “1” there.

Thereby, the terminal 100 in the state of absence is set. Then, theroutine is completed and program flow is returned to processing of thereception display processing routine.

If the cancel switch has been clicked in order to suspend absencesetting, a determination result at step J16 is YES and program flow goesto step J17 for another processing and an input data area is cleared.The input data is data which is temporarily stored in a temporaryregister in correspondence to clicking at one of the above mentionedmail creation switches, that is indicates data which expresses a kind ofabsence notice. Therefore, data which expresses a kind of an absencenotice, and which is temporarily stored in the temporary register arecleared in correspondence to the clicking of the cancel switch.

Thereafter, program flow goes to step J18 and not only is an absencesetting screen image display is cleared but the flag KAKUTEIF is resetand thereafter, the routine is completed and program flow is returned toprocessing of the above mentioned reception display processing routine.

Next, operations of fixed form mail “A” creation processing aredescribed.

The operation of fixed form mail “A” creation processing routine aredescribed in reference to FIG. 106. In an absence setting screen imageof FIG. 105, if the mail creation switch has been clicked, program flowgoes through step J17, then a fixed form mail “A” creation processingroutine shown FIG. 106 is executed, program flow is further advanced tostep J19 and a mail buffer of the mail creation area is cleared there.

Then, program flow goes to step J20, a fixed form mail creationprocessing routine described later is called, a fixed form mail “A”which constitutes an absence notice is created in a mail buffer in themail creation area and thereafter, program flow goes to step J121 forprocessing.

At step J21, a fixed form mail “A” which has been prepared in the mailcreation area MS is copied in the fixed form mail “A” area to completethe routine and thereafter, program flow is returned to processing ofthe above-mentioned absence setting processing routine.

Then, operations of fixed form mail creation processing are described.

There are described operations of a fixed form mail creation routinewhich is called from the above mentioned fixed form mail “A” creationprocessing routine or a fixed form mail “B” creation processing routine.

After the routine is executed through the above mentioned step J20 (seeFIG. 106) or step J48 (see FIG. 111) described later, CPU 1 advanceprogram flow to step J22 shown in FIG. 107.

When program flow reaches step J22, CPU 1 displays the mail creationscreen image on the display section 5 based on mail creation screenimage data read out from the mail creation area.

For example, in the case where a fixed form mail “A” is created, a fixedform mail “A” creation screen image shown in FIG. 110 is displayed onthe screen image. The fixed form mail “A” creation screen imagecomprises: an area where a transmitter address (including a name) isset; an area where a receiver address (including a name) is set; asubject input area in which a subject is individually input; and a textinput area in which the text is input. Besides, in the fixed form mail“A” creation screen image, there are provided an OK switch which isclicked for input confirmation and a cancel switch which is clicked forsuspension of creation.

Now, the case where, for example, a fixed form mail “A” is created isassumed. In this case, CPU 1 displays a fixed form mail “A” creationscreen image on the screen image at the above-mentioned step J22 andsubsequently advances program flow to step J23 and a self address is setin an area as a transmitter address.

Then, at step J23, a mouse cursor is displayed on the screen image andat the following step J25, a character cursor is set in a subject inputarea. Thereafter, at steps J26 and J27, a cursor is moved and displayedin accordance with a pointing operation of the mouse 6.

Then, at step J28, it is determined whether or not clicking has occurredand if there is the clicking, a determination result is YES, programflow goes to step J29 and to the following steps and processing inaccordance with a position on the screen image where clicking hasoccurred is executed. Processings will be described case by case.

If the subject input area has been clicked for inputting a subject,program flow goes to step J29 through step J28. If a determinationresult here is YES, program flow goes to step J30 and a character cursoris set at the subject area and a subject input waiting condition is set.

Then, a key input (data input) is performed in this condition, programflow goes to step J38 and to step J39 shown in FIG. 109 and it isdetermined whether or not a character position is in the subject inputarea.

In this case, since program flow is in the input waiting condition inthe subject input area, if a determination result is YES, and datakey-input in the subject input area are displayed through the followingsteps J40 to J42, whereas the data are stored in the subject area of themail creation area (see FIG. 100) and at the same time the charactercursor is moved and displayed in correspondence to an key input. In suchas manner, after the subject input is completed, CPU 1 returns programflow to the above mentioned step J26.

If the text input area has been clicked for input a mail text, programflow goes to step J31 through step J29. In this case, if a determinationresult at step J31 is YES, program flow goes to step J32, a charactercursor is set at the text input area and the text input waitingcondition is set.

If key input has been made (data input) in this condition, program goesto step J43 through steps J38 and J39 shown in FIG. 109 and it isdetermined whether or not a character position in the text input area.

In this case, since program flow is in the input waiting condition inthe text input area, if a determination result is YES, program flow goesthrough steps J44 and J45 and through J42 and not only is data which hasbeen key-input displayed in the text input area, but a character cursoris moved and displayed in correspondence to the key input, while thedata are stored in the text area of the mail creation area (see FIG.100). Thus, if the text input has been completed, CPU 1 returns programflow to step J26.

If the OK switch has been clicked in a condition that necessary datahave respectively been input in the input areas of the fixed form mail“A” creation screen image (see FIG. 110), program flow goes to step J33shown in FIG. 108 through steps J29 and J31. Then when a determinationresult is YES, then program flow goes to step J34 and the screen imagedisplay is cleared to complete the routine.

If the cancel switch has been clicked, program flow gores through stepsJ29, J31 and J33 to step J35. In this case, if a determination result atstep J35 is YES, program flow goes to step J36, after the mail creationarea is cleared, the screen image display is cleared through step J37 tocomplete the routine.

Then, operations of a fixed form mail “B” creation processing aredescribed.

The operations of the fixed form mail “B” creation processing routineare described in reference to FIGS. 111 and 112.

In an absence setting screen image (see FIG. 105), if the mail “B”creation switch has been clicked, a fixed form mail “B” creationprocessing routine shown in FIG. 111 is executed at step J9 (see FIG.104) and program goes to step J46 to execute address designatingprocessing routine.

In this address designating processing routine, a mail address isdesignated as a precondition to transmit a fixed mail “B” as an absencenotice and the details are described later.

If address designation has been completed which is a precondition for aresponse at an address designation processing routine, CPU 1 advancesprogram flow to step J47 and the mail creation area (see FIG. 100) iscleared.

Then, if program flow goes to step J38, the above mentioned fixed formmail creation processing routine is called to produce a fixed mail “B”which constitutes an absence notice in the mail creation area. In thiscase, a fixed form mail “B” creation screen image exemplified in FIG.112 is displayed.

The fixed form mail “B” creation screen image, as in the above mentionedfixed form mail “A” creation screen image (see FIG. 110), comprises: anarea in which a transmitter address (including name) is stored, an areain which a receiver address (including name) is stored, a subject inputarea in which a subject is input, a text input area in which a text isinput, an OK switch which is clicked in confirmation of an input and acancel switch.

After a fixed form mail “B” has been prepared on the fixed form mail “B”creation screen image, CPU 1 advances program flow to step J49, wherethe fixed form mail “B” produced in the mail creation area is copied toreproduce the fixed form mail “B” in the fixed form mail “B” area (see,FIG. 101B) and after the reproduction, the routine is completed, programflow is thereafter returned to processing in the above mentioned absencesetting processing routine (see FIG. 104).

Then, operations of address designating processing are described.

The operations of an address designating processing routine aredescribed in reference to FIGS. 113 to 116.

If the address designating processing routine has been executed at stepJ46 of the above mentioned fixed form mail “B” creation processingroutine, CPU 1 advances program flow to step J50 in FIG. 113 forprocessing and first, an address list screen image is displayed in thedisplay section 5.

The address list screen image, as in an example shown in FIG. 116,comprises a display matrix for scroll display of ADDRESS(1) toADDRESS(N) registered in the address area of RAM 3, an OK switch and acancel switch disposed in the upper portion of the screen image.

Each row of the display matrix functions as an address list switch andin each row, there are provided name and address display areas. Theaddress list switch is used when an address of a corresponding row isselected and designated and a display condition of each row is changedin response to clicking (for example, a display dot is reversed).

In the name and address display areas, there are respectively displayedan individual name or a handle name, an electronic mail addresscorresponding to ADDRESS(1) to ADDRESS(N).

After such a screen image has been displayed, CPU 1 advances programflow to step J51, a pointer register “m” is set at an initial value “1”,at the following step J52 an ADDRESS(m) is read out from the addressarea corresponding to a value of the pointer register “m” and name andaddress forming the ADDRESS(m) are displayed in the name and addressdisplay areas of the first row of the display matrix.

Then, program flow goes to step J53, a value of the pointer register “m”is incremented by 1, and it is determined whether or not an incrementedvalue of the pointer register “m” exceeds the maximum number, that is,it is determined whether or not read-out on all the ADDRESS(m) has beencompleted. If the readout has not been completed, a determination resultis NO and program flow is returned to step J52 to conduct the readout.If the readout has been completed, a determination result is YES andprogram flow goes to next step J55.

At step J55, a pointer register “L” is set at “1” and at step J56, acounter register “A” to count display rows in the display matrix is setat “1”. Then, at step J57, a cursor is displayed on the address listscreen image.

Thereafter, at steps J58 and J59, the cursor is moved and displayed inresponse to a pointing operation of the mouse 6 and at step J60 it isdetermined whether or not the mouse has been clicked.

Then, If the mouse has been clicked, a determination result here is YESand program flow goes to step J61 and to the following steps andprocessing corresponding to a position at which is clicked is executed.The processing are described case by case.

If the address list switch is clicked, and when one of the address listswitches which corresponds to a row of the display matrix has beenclicked while pointing, a determination result of step J61 is YES,program flow goes to next step J62 and the counter register “A” is setat an address number of a row which has been clicked.

Then, at step J64, name and address display areas corresponding to avalue of the counter register “A” are displayed in reverse. Thereby, itis shown that address designation has been made.

In succession, at step J64, it is determined whether or not a value of apointer register “L” is larger than the maximum number, that is it isdetermined whether or not a value of a pointer register “L” exceeds thenumber of registered addresses which can be stored in the fixed formmail “B” area (see FIG. 101B).

Here, if the value of a pointer register “L” exceeds the number ofregistered addresses, a determination result is YES and program flowgoes to step J65. At step J65, there is displayed for a predeterminedperiod of time a warning with the effect that new registration cannot bemade and at step J66, the name and address display areas which aredisplayed in reverse to step J36 is returned to a normal displaycondition. Thus after cancellation of address designation, program flowgoes to step J58.

On the contrary, if a value of a pointer “L” has not exceeded themaximum number and when a condition in which new registration ispossible available, a determination result is NO and program flow goesto step J67.

At step J67, an ADDRESS(A) designated at step J63 is stored as aREGISTERED ADDRESS(L) in the fixed form mail “B” area corresponding to avalue of the pointer register “L”. Thereby, a desired address selectedfrom the address lists is decided as a condition for transmission of thefixed form mail “B” in response as an absence notice.

Then, program flow goes to step J68, a value of the pointer register “L”is incremented by 1 and thereafter program flow is returned to step J58.

If the OK switch has been clicked, program flow goes to step J69 shownin FIG. 115 through step J61, and when a determination result is YES,program flow goes to next step J70 and the address list screen image iscleared to complete the routine. Thereafter, program flow is returned tothe above mentioned fixed form mail “B” creation routine.

If the cancel switch has been clicked, program flow goes to step J71thorough step J69 and when a determination result is YES, program flowgoes to step J72, where the REGISTERED ADDRESS(l) stored in the fixedform mail “B” area corresponding to value of the pointer register “L” iscleared. At next step J73, the address screen image is cleared tocomplete the routine.

Then, operations of a fixed form mail “C” creation processing aredescribed.

The operations of a fixed form mail “C” creation processing routine aredescribed in reference to FIGS. 117 to 120.

In an absence setting screen image (see FIG. 105), if the mail “C”creation switch has been clicked, the fixed form mail “C” creationprocessing routine shown in FIG. 117 is executed through step J11 andprogram flow goes to step J74, where a password input screen image isdisplayed on the display section 5.

The pass word input screen image, as shown in FIG. 119, is provided witha display matrix to scroll-display a plurality of PASSWORD(1) toPASSWORD(l) which are registered in the fixed form mail “C”area (seeFIG. 102) of RAM 3 and in addition, with a fixed form mail creationswitch an OK switch, a clear switch and a cancel switch.

Each row of the display matrix functions as a password list switch andat the same time the display matrix is adapted to input a password ineach row. The password list switch is used when a password of acorresponding row is selected, and a display condition of each row ischanged in response to clicking (for example, a display dot isreversed).

Now, if the password input screen image has been displayed, CPU 1advances program flow to step J75 and the pointer register “L” is set atan initial value “1”. At the following step J76, a PASSWORD(L) readoutfrom the fixed form mail “C” area in correspondence to a value of thepointer register “L” is displayed in the first row of the displaymatrix.

Then, at step J77, a value of the pointer register “L” is incremented by1 and it is determined whether or not an incremented value of thepointer register “L” is larger than the maximum number, that is, it isdetermined whether or not readout of all the passwords has beencompleted. If readout of all of the passwords has not been completed, adetermination result is NO and program flow goes to step J76 to continuethe readout, but when the readout has been completed, a determinationresult is YES and program flow goes to next step J79.

At step J79, a cursor corresponding to the mouse 6 is displayed on thepassword input screen image and at the following step J80, the counterregister “A” to count the designated rows in the display matrix is setat “1”.

Thereafter, program flow goes to step J81 and a character cursor isplaced in the first row of the display matrix in correspondence to avalue of the counter resister “A”, in other words in the PASSWORD(A).

Then, steps J82 and J83, a cursor is displayed and moved correspondingto a pointing operation of the mouse 6 and at step J84 it is determinedwhether or not the mouse 6 has been clicked.

Then, if the mouse 6 has been clicked, a determination result here isYES, program flow goes to step J85 and to the following steps shown inFIG. 118 and processing corresponding to a position at which clickinghas been made is executed. Then, the processings are described case bycase.

When the password list switch is clicked, and when one of the passwordlist switches corresponding to rows of the display matrix has beenclicked, a determination result of step J85 shown in FIG. 85 is YES,program flow goes to next step J86 and the counter register “A” is setat a password list number of a row at which clicking has been made. Insuccession, at step J87, the character cursor is set at a row of thePASSWORD(A) corresponding to a value of the counter register “A”.

If key input (password input) has been made in this condition, then adetermination result of step J84 (see FIG. 117) is NO and when adetermination result of step J100 shown in FIG. 118 is YES, program flowgoes to step J101.

At step J101, key input is made in the PASSWORD(A) and at the followingstep J102, a symbolic display is made in correspondence to the keyinput. The symbolic display is not to display a password to be input asit looks but a password is displayed by a substitution in the form of asymbol such as “★” or the like.

Then, at step J103, a password key-input is registered in the fixed formmail “C” area, whereas a character cursor is displayed and movedcorresponding to key-inputting. Thereafter, CPU 1 advances program flowto step J82.

If the mail creation switch has been clicked in order that program flowis made to go to a fixed form mail “C” creation, wherein as mentionedabove, a password registration which is a precondition for a fixed formmail “C” to be transmitted in response as an absence notice had beencompleted, program flow goes to step 88 through step J85 and when adetermination result is YES, program flow is advanced to next step J89.

At step J89, the above mentioned fixed form mail creation processingroutine (see FIGS. 107 to 109) is executed and a fixed form mail “C”which constitutes an absence notice is produced in the mail creationarea. In this case, a fixed form mail “C” creation screen image isdisplayed on the screen exemplified in FIG. 120.

Then, at step J90, the fixed form mail “C” produced in the mail creationarea is stored in the MAIL(A) area of a fixed form mail “C” area (seeFIG. 102).

If the OK switch has been clicked after creation of a fixed form mail“C” has been completed, program flow goes to step J91 through steps J85and J88. If a determination result here is YES, program flow furthergoes to next step J92, the password input screen image is cleared tocomplete the routine and program flow is returned to the absence settingprocessing routine (see FIG. 104).

If the cancel switch has been clicked when suspending password input,program flow goes to step J93 through steps J85, J88 and J91 and at stepJ93 when a determination result is YES, program flow goes to step J94.At step J94, after the password, which has been key input, is cleared,the routine is completed and program flow is returned to the absencesetting processing routine.

If the clear switch has been clicked, program flow goes to step J96through steps J85, J88, J99 and J93 and at step J93, if a determinationresult is YES, program flow goes to next step J97, where the passwordwhich is currently selected, that is the PASSWORD(A) stored in the fixedform mail “C” area, is cleared. At the following step J98, a MAIL(A)which is stored in the fixed form mail “C” is cleared in a correspondingmanner. Thereafter, program flow goes to step J99, where a display ofthe PASSWORD(A) which is selected on the password input screen image isalso cleared.

Then, operations of fixed form mail “D” creation processing aredescribed.

The operators of a fixed form mail “D” creation processing routine aredescribed in reference to FIGS. 121 to 124.

If a mail “D” creation switch has been clicked on the absence settingscreen image (see FIG. 105), a fixed form mail “D” creation routineshown in FIG. 121 is executed at step J13 (see FIG. 104) and programflow goes to step J104, where a pointer register “L” is set at aninitial value “1”.

Then, at step J105, a fixed form mail “D” creation screen image isdisplayed on the display section 5. The fixed form mail “D” creationscreen image, as an example shown in FIG. 124, is provided with apassword input area in which a password is input, an area where atransmitter address (including name) is set, an area where a receiveraddress (including name) is set, a subject input area where a subject isinput, a text input area where a mail text is input and in addition, anaddress switch, a next mail switch, an OK switch and a cancel switch.

In the transmitter address area, a self-address is automatically set asa transmitter address (including name).

Then, if such a fixed form mail “D” creation screen image has beendisplayed, CPU 1 advances program flow to step J106, where the charactercursor is set in the password area. At step J107, a cursor is displayedon the fixed form mail “D” creation screen image.

Then, at steps J108 and J109, a cursor is displayed by pointingoperation of the mouse 6 and moved and at step J110, it is determinedwhether or not the mouse 6 has been clicked. If the mouse 6 has beenclicked, a determination result is YES and program flow goes to stepJ111 and to the following steps as shown in FIG. 122 and processingcorresponding to a position on the screen image at which the mouse 6 hasbeen clicked is executed. Processings are described case by case.

If the password-input area has been clicked, a determination result atstep J124 shown in FIG. 123 is YES. Program flow goes to next step J125and it is determined at which area the mouse 6 has been clicked, thepassword area, the subject area or the text input area. Then, the mouse6 has been clicked in the password area, program flow goes to step J126,where a character cursor is set in the password area and a passwordinput waiting condition is created.

Then, if key input (password input) has been conducted in thiscondition, a determination result at J129 is YES and program flow goesto step J130, where it is determined at which area the key input ismade. If key input has been made in the password area, program flow goesto step J131 and not only is the password which has been key inputdisplayed on the password area but it also is stored in the mailcreation area. In succession, at step J134, a character cursor isdisplayed and moved in the password area. Thereafter, CPU 1 returnsprogram flow to step J108.

If the subject area has been clicked, a determination result at stepJ124 shown in FIG. 123 is YES and program flow goes to step J125, whereit is determined at which the mouse 6 has been clicked, the passwordarea, the subject input area or the text input area. Then, if thesubject area has been clicked, program flow goes to step J127, where acharacter cursor is set in the subject area and a subject waitingcondition is created.

If key input has been made in this condition, a determination result atstep J129 is YES, program flow goes to step J130 and it is determined atwhich area key input is made. If key input has been made at the subjectinput area, program flow goes to step J132, where not only is a subjectwhich as been key input displayed in the subject area but it is alsostored in the mail creation area. In succession, at step J134, thecharacter cursor is moved and displayed in the subject area. Thereafter,CPU 1 returns program flow to step J108.

If the text input area has been clicked, a determination result at stepJ124 shown in FIG. 123 is YES, program flow goes to step J125, where itis determined at which the mouse is clicked, the password input area,the subject input area or the text input area. Then, if the text inputarea has been clicked, program flow goes to step J128, where thecharacter cursor is set in the text input area and a mail text inputwaiting condition is created.

If key input has been made in this condition, a determination result atstep J129 is YES and program flow goes to step J130, where it isdetermined at which area key-input is made. If key input has been madein the text input area, program flow goes to step J133, not only is atext key in which input has been made displayed in the text area but itis also stored in the mail creation area. In succession, at step J134,the character cursor is moved and displayed in the text area incorrespondence to the key input. Thereafter, CPU 1 returns program flowto the above-mentioned step J110.

After inputs of the password, subject and text have been completed, theaddress list switch is clicked in order to designate a mail addresswhich constitutes an address of a fixed form mail “D” (an absencenotice).

If the address list switch has been clicked, a determination result atstep J111 shown in FIG. 122 is YES and program flow goes to next stepJ112, where the above mentioned address designating processing routine(see FIGS. 113 to 115) is executed and an address of a received mail isdesignated as one of preconditions for transmission of a fixed form mail“D” in response as an absence notice.

Not only is the designated address stored as a receiver address in themail creation area but it is also displayed in a receiver address areaof the fixed form mail “D” creation screen image (see FIG. 124).

After the above mentioned processing have been executed and one fixedform mail “D” has been prepared in the mail creation area, the next mailswitch is clicked when a fixed form mail “D” with a different content isdesired to be prepared.

If the next mail switch has been clicked, a determination result stepJ113 shown in FIG. 122 is YES and program flow goes to step J112, wherea fixed form mail “D” held in the mail creation area, that is, a fixedform mail “D” which has already been prepared is stored as a mail(L) inthe fixed form mail “D” area (see FIG. 103).

Then, at step J115, the pointer register “L” is incremented by 1 and itis determined whether or not a value of the pointer register “L” whichhas been incremented is larger than the maximum number, that is, thevalue exceeds the number of mails which can be stored in the fixed formmail “D” area.

At this point, if the value has not exceeded the number of mails whichcan be stored in the fixed form mail “D” area, a determination result isNO and program flow is returned to the above mentioned step J105 (seeFIG. 121) and goes to new creation of a fixed form mail “D”.

On the contrary, if the value exceeds the number of mails which can bestored in the fixed form mail “D” area, a determination result at stepJ116 is YES and program flow goes to next step J117, where there isdisplayed for a predetermined period of time a warning with the effectthat a new registration of a fixed form mail “D” cannot be made.Thereafter, program flow goes to step J118 and the mail creation area iscleared.

If the OK switch is clicked and if the OK switch has been clicked aftera fixed form mail “D” is created, program flow goes to step J119 throughsteps J111 and J113, where when a determination result is YES, programflow goes to next step J120. At step J120, the fixed form mail “D”creation screen image is cleared to complete the routine and thereafter,program flow is returned to the abovementioned absence settingprocessing route (see FIG. 104).

If the cancel switch has been clicked in order to suspend creation offixed mail “D”, program flow goes to step J121 through steps J111, J113and J119. At step J121, if a determination result is YES, program flowgoes to next step J122, where a mail (L) stored in the fixed form mail“D” creation screen image is cleared and program flow goes to next stepJ123. At step J123, the fixed form mail “D” creation screen image iscleared to complete the routine and thereafter program flow is returnedto the above mentioned absence setting processing routine (see FIG.104).

Operation of a reception processing (timer interrupt) routine aredescribed with reference to FIGS. 125 to 127.

When a terminal 100 has entered a condition that the terminal 100 hasaccessed to the server 300 through the dedicated communication line 200,CPU 1 handles interrupts at set intervals to execute a receptionprocessing (timer interrupts) routine shown in FIG. 125. If the routinehas been executed, CPU 1 advances program flow to step J135 and from theserver 300, it is determined whether or not there is a notice of mailarrival.

It is determined whether or not a received mail which corresponds to amail address is present and if the received mail is present, the server300 sends a response indicating a mail arrival to the terminal 100. Inthe terminal 100, if a determination result at step J135 is YES, programflow goes to next step J136.

On the other hand, if no response indicating a received mail is present,a determination result is NO, in this case the routine is terminated andprogram flow is returned to a main routine described later.

First of all, storage of a received mail is described.

If a mail reception has started, CPU 1 advances program flow to stepJ126, where a value of a pointer register “n” is set at an initialvalue 1. At the following step J137, it is determined whether or not aRECEIVED MAIL(n) in the received mail storage area (see FIG. 100), whichcorresponds to the value of the pointer register “n”, is empty.

If the RECEIVED MAIL(n) is empty, a determination result at step J137 isYES, program flow goes to next step J138 and a received mail receivedfrom the server 300 is stored in the RECEIVED MAIL(n) area in thereceived mail storage area (see FIG. 100) which corresponds to the valueof the pointer register “n”.

Then, program flow goes to step J139, where CPU 1 sets an unseal flagKAIFUF (n) of the received mail at “0” in order to indicate a sealcondition. In succession, at step J140, a reception date and time(including year, month and date) is stored in the register TIME of theRECEIVED MAIL (n) area and program goes to step J141 described later foranother processing.

If not empty space is available in the RECEIVED MAIL(n) area, adetermination result at step J137 is NO and program flow goes to stepJ142. At step J142, a value of the pointer register “n” is incrementedby 1 and at the following step J143, it is determined whether or not “n”exceeds the maximum number of mails which can be stored in the receivedmail storage area.

Here, if “n” has not exceeded the maximum number, a determination resultis NO and program flow is returned to step J137, where it is againdetermined whether or not there is an empty space in the RECEIVED MAIL(n) area.

On the other hand, if all the mail area MAIL have been filled withreceived mails and the received mail storage age (mail box) is filled toits full, a determination result at step J143 is YES and program flowgoes to step J144. At step J144, a mail with the oldest reception dateand time TIME (hereinafter referred to as an oldest mail) is retrievedamong mails stored in the received mail storage area (mailbox).

Then, at step J145, not only is the retrieved oldest mail erased but thepointer register “n” is set at the number of the erased oldest mail.Thereafter, program flow is returned to step of J138 and a newlyreceived mail is stored in the area of the oldest mail erased.

Then, processing in absence setting is described.

After processing in which a received mail is stored in the received mailstorage area (mailbox) is completed as mentioned above, CPU 1 advancesprogram flow to step J141, where it is determined whether or not theflag KAKUTEIF, which indicates that absence setting has been made ornot, is set at “1”, that is, whether or not the terminal 100 is in thestate of absence.

Here, if the terminal 100 in the state of absence is set by a user'soperation, since the flag KAKUTEIF indicates “1” by the above mentionedabsence setting processing routine (see FIG. 104), a determinationresult is YES and CPU 1 advances program flow to step J146 and to thefollowing steps shown in FIG. 126. If the terminal in the state ofabsence is not set, a determination result is NO and the routine istemporarily completed.

Now, if the terminal 100 in the state of absence has been set by auser's operation and program flow has been made to go to step J146 andto the following steps shown in FIG. 126, CPU 1 selects and makes totransmit one of the fixed form mail “A” to the fixed form mail “D” whichare stored in the fixed form mail “A” area to the fixed form mail “D”area of RAM 3 shown in FIG. 100. Then, cases, where the fixed form mail“A” to the fixed form mail “D” are automatically be transmitted aredescribed case by case.

The case of response by fixed form mail “B” will be described.

At step J146 of FIG. 126, a value of the pointer register “L” is set at“1” and at the following step J147, it is determined whether or not atransmitter address which coincides with a REGISTERED ADDRESS(L) readout from the fixed form mail “B” area (see FIG. 101B) in correspondenceto a value of the pointer register “L” is included in a received mail.

Here, if the transmitter address of a received mail does not coincideswith the REGISTERED ADDRESS(L), a determination result at step J147 isNO and program flow goes to next step J148, where a value of the pointerregister “L” is incremented by 1.

Then, at step J149, it is determined whether or not an incremented valueof the pointer register “L” exceeds the number of addresses which can beregistered in the fixed form mail “B” area, that is, whether or notaddress determinations which refers to all the REGISTERED ADDRESS(1) toREGISTERED ADDRESS(L) have been conducted.

If all the address determinations have not completed, a determinationresult is NO and program flow is returned to step J147 and the addressdetermination is continued. Then, in the address determinations, if itis determined that the same transmitter address as the REGISTEREDADDRESS(L) is included in a received mail, a determination result atstep J147 is YES and program flow goes to step J150.

At step J150, a REGISTERED ADDRESS(L) which has been retrieved by anaddress determination is stored in a receiver address of the fixed formmail “B” and at the following steps J151 and J152, transmission of thefixed form mail “B” is continued till its completion and at the saketime when the transmission is completed, the routine is terminated.

As described above, mail addresses which require a notice of absence areregistered in the fixed form mail “B” area and when a transmitteraddress of a received mail which is received in the state of absencecoincides with one of the mail addresses, a fixed form mail “B” istransmitted to the same address as the transmitter address in response.

Therefore, since a notice of absence is transmitted only to a mail froma predetermined transmitter, a content of the transmitted fixed formmail “B” is only required to be limited to information necessary to thetransmitter, which makes it possible to transmit a notice of absencecorresponding to a content of a received mail.

The case of response by a fixed form mail “C” will be described.

If it is determined that attributes of a received mail does not satisfya response condition of a fixed form mail “B”, a determination result atstep J149 is YES and program flow goes to step J153 and to the followingsteps and it is determined whether or not the response condition of afixed form mail “C” accepts the attributes of a received mail.

That is, program flow goes to step J153, a value of the pointer register“L” is reset at “1” there, and at the following step J154, it isdetermined whether or not a PASSWORD(L) read out from the fixed formmail “C” area (see FIG. 102) in correspondence to a value of the pointerregister “L” is included in a subject and text of a mail stored in theRECEIVED MAIL(n) in the received mail storage area.

Here, if the PASSWORD(L) is not included in a received mail, adetermination result at step J154 is NO and program flow goes to nextstep J155, where a value of the pointer “L” is incremented by 1.

Then, at step 156, it is determined whether or not an incremented valueof the pointer register “L” exceeds the number of passwords which can beregistered in the fixed form mail “C” area, that is, whether or notpassword determination which refers to all the PASSWORD(1) toPASSWORD(L) has been completed.

If the password determination has not been completed, a determinationresult is NO and program flow is returned to step J154, where thepassword determination is repeated based on an incremented value of thepointer register “L”. In the password determination, if a PASSWORD(L) isincluded in a received mail, a determination result at step J154 is YESand program flow goes to next step J157 for another processing.

At step J157, a MAIL(L) corresponding to the PASSWORD(L) retrieved bythe password determination is read out from the fixed form mail “C” area(see FIG. 102) and a transmitter address of the RECEIVED MAIL(n) area isstored in a receiver address of the MAIL(L).

Then, at step J158, a fixed form mail “C” (MAIL(L)) whose receiveraddress is replaced by the transmitter address of the received mail MAIL(n) is transmitted.

Then, at step J159, transmission of the fixed form mail “C” (MAIL(L)) iscontinued till it completion and at the same time when the transmissionhas been completed, a determination result is YES and the routine isterminated.

As described above, a plurality of PASSWORD(1) to PASSWORD(L) andMAIL(1) to MAIL(L) of the fixed form mail “C” which respectivelycorrespond with the passwords are registered in the fixed form mail “C”area, retrieval is conducted whether or not any of the above mentionedPASSWORD(1) to PASSWORD(L) is included in a subject and text of areceived mail in the state of absence and if there is a password incoincidence, a fixed form mail “C” corresponding to a password incoincidence is transmitted to the same address as a transmitter.Therefore, a content of the fixed form mail “C” to be transmitted inresponse can be limited to information which the transmitter requiresand as a result, it is made possible to transmit a notice of absencecorresponding to a content of the received mail.

The case of response by a fixed form mail “D” will be described.

If it is determined by the above mentioned password determination thatattributes of a received mail does not satisfy the response condition ofa fixed form mail “C”, a determination result at step J156 is YES andprogram flow goes to step J160 and to the following steps shown in FIG.127, where it is determined whether or not a response condition of afixed form mail “D” accepts the attributes of a received mail.

That is, program flow goes to step J160, where a value of the pointerregister “L” is reset at “1”. At next step J161, it is determinedwhether or not a password of a MAIL(L) read out from the fixed form mail“D” area (see FIG. 103) in correspondence to a value of the pointerregister “L” is included in a subject and text of a mail stored in aRECEIVED MAIL(n) area of the received mail storage area.

Here, if a password is not included in the received mail, adetermination result at step J161 is NO and program flow goes to nextstep J162, where a value of the pointer register “L” is incremented by1.

Then, at step J163, it is determined whether or not an incremented valueof the pointer register “L” exceeds the number of mails which can beregistered in the fixed form mail “D” area, that is, it is determinedwhether or not password determination which refers to passwords ofMAIL(1) to MAIL(L) has been completed.

If the password determination has not completed, a determination resultis NO and program flow is returned to step J161, where the passworddetermination is repeated based on an incremented value of the pointerregister “L”.

Then, in the password determination, if a password of a MAIL(L) isincluded in a subject and text of the received mail, a determinationresult at step J161 is YES and program flow goes to next step J164.

At step J164, it is determined whether or not a receiver address of aMAIL(L) retrieved by the password determination coincides with atransmitter address of a received mail (that is, a RECEIVED MAIL)n)area).

Here, if the receiver address of mail L does not coincide with thetransmitter address of a received mail, since attributes of the receivedmail does not satisfy the response condition of a fixed form mail “D”, adetermination result is NO and program flow is returned to step J162,where a value of the pointer register “L” is incremented and thepassword determination is continued.

On the other hand, if the receiver address of a MAIL(L) coincides withthe transmitter address of a received mail, since attributes of thereceived mail satisfy the response condition of a fixed form mail “D”, adetermination result is YES and program flow goes to next step J165,where the MAIL(L) of the fixed form mail “D” area which satisfy theresponse condition of the fixed form mail “D” is transmitted as a fixedform mail “D”.

As described above, a fixed form mail “D” including a password which hasbeen set in advance and having a receiver address which coincides with atransmitter address of a received mail is retrieved in the fixed frommail “D” area and if the fixed form mail “D” which satisfy the conditionis available, the fixed form mail “D” is transmitted to the same addressas the transmitter address. Therefore, a content of the fixed form mail“D” to be transmitted can be limited to information necessary to thetransmitter and thus a notice of absence which corresponds to thecontent of the received mail can be transmitted.

The case of response by a fixed form mail “A” will be described.

In the case of a received mail having attributes which do not satisfyany of the response conditions for the above mentioned fixed form mails“B”, “C” and “D”, a determination result at step J163 is YES and programflow goes to step J167.

At step J167, a transmitter address of a received mail (that is, aRECEIVED MAIL(n) area) is stored in an receiver address of a fixed formmail “A” read out from the fixed mail form “A” area (see FIG. 10A) andat next step J168, the fixed form mail “A” is transmitted to thetransmitter. Thereafter, at step J169, transmission of the fixed formmail “A” is continues till its completion and at the same time when thetransmission has been completed, a determination results is YES and theroutine is completed.

As described above, if a received mail having attributes which does notsatisfy any of the response conditions for the fixed form mails “B”, “C”and “D”, a fixed form mail “A” is transmitted indiscriminately to thetransmitter in response as a notice of absence.

As mentioned above, in a reception processing routine, if any emptyspace is available in a mail box (the received mail storage area), aRECEIVED MAIL(n) is stored in a RECEIVED MAIL(n) area. Thereafter, notonly is the flag KAIFUF of the mail set at “1” in order to indicate aseal condition, but a reception time is stored in TIME while being set.However, if the mail box is full, a mail with the oldest reception timein the mail box is erased and then a new received mail is stored.

If the state of absence is set when a received mail is stored, it isdetermined which of the response conditions set in advance for fixedform mails “A” to “D” attributes of the received mail satisfy and afixed form mail which satisfies one of the response conditions istransmitted in response.

As described above, according to the above mentioned ninth embodiment,the terminal 100 of FIG. 1 comprises:

mail receiving means for receiving an electronic mail;

absence setting means for setting an apparatus operation in an absencemode;

fixed form mail storage means for storing a plurality of kinds of fixedform mail in advance;

mail determining means for determining attributes of the receivedelectronic mail when the mail receiving means receives the electronicmail in the absence mode;

mail selecting means for selecting one of fixed form mails stored insaid mail storage means corresponding to the attributes determined bythe mail determining means from the plurality of kinds of fixed formmail stored in the fixed form mail storage means; and

automatic response means for transmitting the fixed form mail selectedby the mail selecting means in response to the same address as atransmitter of the received electronic mail.

The most optimal fixed form mail is selected among a plurality of kindsof fixed form mail corresponding to attributes of a received mailreceived in an absent time and the selected fixed form mail istransmitted.

In the above mentioned ninth embodiment, there is described anelectronic mail system in which a program to receive and transmitelectronic mails is stored in ROM 2, but such constitutions may beadopted that a program to transmit or receive an electronic mail isstored in such media as a floppy disk, a compact disk and the like andan apparatus such as a personal computer or a word processor for generalpurpose use, or the like executes the program.

The machine readable storage medium stores a program for electronic mailprocessing, the program comprising:

(i) step of receiving an electronic mail;

(ii) step of setting an apparatus operation in an absence mode;

(iii) step of storing a plurality of kinds of fixed form mail on fixedform mail storage means in advance;

(iv) step of determining attributes of a received electronic mail whenthe electronic mail is received by the step (i) in the absence mode;

(v) step of selecting one of fixed form mails stored in said mailstorage means corresponding to the attributes determined by the step(iv) from the plurality of kinds of fixed form mail stored in the fixedform mail storage means; and

(vi) step of transmitting the fixed form mail selected by the step (v)in response to the same address as a transmitter of the receivedelectronic mail.

The program is executed by an apparatus such as a personal computer or aword processor for general purpose use, or the like.

Industrial Applicability

According to the present invention, there is provided an electronic mailsystem which facilitates a receiver to be delivered an electronic mailof emergency when the receiver is absent without any inconvenienceoccurred to the receiver in terms of privacy and other aspects.

What is claimed is:
 1. An electronic mail system comprising: mailreceiving means for receiving an electronic mail; absence mode settingmeans for setting an absence mode indicating the state of absence of areceiver of the electronic mail; mail transmitting means fortransmitting a predetermined fixed form mail responding to a firstelectronic mail received by the mail receiving means in the absencemode; and control means for making the mail transmitting means totransmit a specific fixed form mail when the control means determinesthat a second electronic mail from a receiver responding to thepredetermined fixed form mail satisfies a specific condition.
 2. Anelectronic mail system according to claim 1, wherein said absence modesetting means sets the absence mode only a specific period.
 3. Anelectronic mail system according to claim 1, wherein said control meansdetermines that the specific condition is satisfied when a transmitterof the first electronic mail and a transmitter of the second electronicmail coincide with each other and if the second electronic mail includesa password.
 4. An electronic mail system according to claim 3, whereinthe password is included in the predetermined fixed form mail.
 5. Anelectronic mail system according to claim 1, wherein the specific fixedform mail includes information on a contact place to a receiver of theelectronic mail in an absent period.
 6. An electronic mail systemcomprising: mail receiving means for receiving an electronic mail;absence mode setting means for setting an absence mode indicating thestate of absence of a receiver of the electronic mail; mail transmittingmeans for transmitting to a third party a predetermined fixed form mailresponding to a first electronic mail received by the mail receivingmeans in the absence mode; and mail transfer means for, when said mailreceiving means receives a second electronic mail responding to thepredetermined fixed form mail and transmitted from the third party andthe second electronic mail satisfies a specific condition, causing themail transmitting means to transmit the first electronic mail to apredetermined address.
 7. An electronic mail system according to claim6, wherein said absence mode setting means sets the absence mode only aspecific period.
 8. An electronic mail system according to claim 6,wherein said mail transfer means determines that the specific conditionis satisfied when a transmitter of the first electronic mail and atransmitter of the second electronic mail coincide with each other andif the second electronic mail includes a password.
 9. An electronic mailsystem according to claim 8, wherein the password is included in thepredetermined fixed form mail.
 10. An electronic mail system comprising:mail storage means for storing a plurality of fixed form mails; mailreceiving means for receiving an electronic mail; address designatingmeans for designating an address of a specific receiver; maildetermining means for determining whether or not a transmitter addressof the received electronic mail is an address designated by said addressdesignating means when said mail receiving means receives the electronicmail; mail selecting means for selecting one of fixed form mails storedin said mail storage means based on a determination result by said maildetermining means; and mail transmitting means for transmitting thefixed form mail selected by said mail selecting means to the sameaddress as the transmitter address of the received electronic mail. 11.An electronic mail system comprising: mail storage means for storing aplurality of fixed form mails; mail receiving means for receiving anelectronic mail; mail determining means for determining whether or notidentification information is included in the electronic mail when saidmail receiving means receives the electronic mail; mail selecting meansfor selecting one of fixed form mails stored in said mail storage meansbased on a determination result by said mail determining means; and mailtransmitting means for transmitting the fixed form mail selected by saidmail selecting means to the same address as a transmitter address of thereceived electronic mail.
 12. An electronic mail system according toclaim 10, wherein said mail determining means, said mail selecting meansand said mail transmitting means are operated only in a predeterminedperiod.
 13. An electronic mail system according to claim 11, whereinsaid mail determining means, said mail selecting means and said mailtransmitting means are operated only in a predetermined period.
 14. Anelectronic mail system according to claim 10, wherein said addressdesignating means comprises an all address designating means fordesignating all the addresses in one operation.
 15. An electronic mailsystem according to claim 11, wherein the identification information isinformation indicating a content of the received electronic mail is anemergency.
 16. An electronic mail system comprising: mail receivingmeans for receiving an electronic mail; address designating means fordesignating an address of a specific receiver; mail determining meansfor determining whether or not a transmitter address of the receivedelectronic mail is the address designated by said address designatingmeans when said mail receiving means receives the electronic mail; mailtransmitting means for transmitting a fixed form mail to the sameaddress as the transmitter address of the received electronic mail whensaid mail determining means determines that the transmitter address ofthe received electronic mail is not the address designated by saidaddress designating means; and mail transfer means for transferring thereceived electronic mail to a predetermined address when said maildetermining means determines that the transmitter address of thereceived electronic mail is the address designated by said addressdesignating means.
 17. An electronic mail system comprising: mailreceiving means for receiving an electronic mail; mail determining meansfor determining whether or not a password is included in the electronicmail when said mail receiving means receives the electronic mail; mailtransmitting means for transmitting a fixed form mail to the sameaddress as a transmitter address of the received electronic mail whensaid mail determining means determines that a password is not includedin the electronics mail; and mail transfer means for transferring thereceived electronic mail to a predetermined address when said maildetermining means determines that a password is included in theelectronic mail.
 18. An electronic mail system according to claim 17,wherein the password is information indicating a content of the receivedelectronic mail is an emergency.
 19. An electronic mail systemcomprising: mail receiving means for receiving an electronic mail; dateand time setting means for setting a specific period of time; receptiondate and time determining means for determining whether or not said mailreceiving means receives the electronic mail during the specific periodof time; mail determining means for determining whether or not theelectronic mail which is determined to be received during the specificperiod of time by the reception date and time determining means is aresponse date and time designated mail which designates the responsedate and time; response date and time determining means for determiningwhether or not the response date and time is in the specific period oftime when the electronic mail is determined to be the response date andtime designated mail by said mail determining means; and mailtransmitting means for transmitting a response mail requesting for achange of the response date and time to a different response date andtime except the specific period of time when said response date and timedetermining means determines that the response date and time is in thespecific period of time.
 20. An electronic mail system according toclaim 19, wherein said mail transmitting means transmits a furtherresponse mail including different receiver address information when saidmail receiving means receives the electronic mail which refuses a changeto the different response date and time in response to the responsemail.
 21. An electronic mail system according to claim 19, which furthercomprises date and time changing means for changing the response dateand time designated by the response date and time designated mail to thedifferent response date and time when said mail receiving means receivesthe electronic mail which accepts a change to the different responsedate and time in response to the response mail.
 22. An electronic mailsystem according to claim 21, wherein said date and time changing meanscomprises mail erasing means for erasing the electronic mail of theacceptance when the response date and time designated by the responsedate and time designated mail is changed to the different response dateand time.
 23. An electronic mail system according to claim 21, whereinsaid date and time changing means changes the response date and timedesignated by the response date and time designated mail to a newresponse date and time when said mail receiving means receives anelectronic mail which designates the new response date and time exceptthe specific period of time, different form the different response dateand time in response to the response mail.
 24. An electronic mail systemaccording to claim 23, wherein said date and time changing meanscomprises mail erasing means for erasing the electronic mail whichdesignates the new response date and time when the response date andtime designated by the response date and time designated mail is changedto the new response date and time.
 25. An electronic mail systemaccording to claim 19, wherein said mail transmitting means transmits afurther response mail including different receiver address informationwhen said mail receiving means receives an electronic mail whichdesignates a new response date and time in the specific period of timein response to the response mail.
 26. An electronic mail systemaccording to claim 19, wherein said mail receiving means recognizes thatan electronic mail received in response to the response mail iseffective when identification information of a transmitter of theelectronic mail received in response to the response mail coincides withidentification information of a transmitter of the response designatedmail.
 27. An electronic mail system comprising: mail receiving means forreceiving an electronic mail; date and time setting means for setting aspecific period of time; reception date and time determining means fordetermining whether or not said mail receiving means receives theelectronic mail during the specific period of time; mail determiningmeans for determining whether or not the electronic mail which isdetermined to be received during the specific period of time by thereception date and time determining means is a response date and timedesignated mail which designates the response date and time; responsedate and time determining means for determining whether or not theresponse date and time is in the specific period of time when theelectronic mail is determined to be the response date and timedesignated mail by said mail determining means; mail transmitting meansfor transmitting a request for change mail requesting for a change inthe response date and time to a different response date and time exceptthe specific period of time when the response date and time which isdetermined by the response date and time determining means is in thespecific period of time; date and time changing means for changing theresponse date and time of the response date and time designated mailwhen said mail receiving means receives a response mail which indicatesacceptance of the request for change after the request for change mailis transmitted by said mail transmitting means; and mail transfer meansfor transferring the response date and time designated mail to apredetermined address when said mail receiving means receives a responsemail which refuses the request for change after the request for changemail is transmitted by said mail transmitting means.
 28. An electronicmail system according to claim 27, wherein said date and time changingmeans changes the response date and time of the response date and timedesignated mail when a response mail received by said mail receivingmeans from the same transmitter as a transmitter of the response dateand time designated mail includes a specific password and the acceptanceafter said mail transmitting means transmits the request for changemail.
 29. An electronic mail system according to claim 27, wherein saidmail transfer means transfers the response date and time designated mailto the predetermined address when a response mail received by said mailreceiving means from the same transmitter as a transmitter of theresponse date and time designated mail date includes a specific passwordand the refusal after said mail transmitting means transmits the requestfor change mail.
 30. An electronic mail system comprising: mailreceiving means for receiving an electronic mail; absence setting meansfor setting an apparatus operation in an absence mode; fixed form mailstorage means for storing a plurality of kinds of fixed form mail; maildetermining means for determining attributes of the received electronicmail when said mail receiving means receives the electronic mail in theabsence mode; mail selecting means for selecting one of fixed form mailsstored in said mail storage means corresponding to the attributesdetermined by said mail determining means from the plurality of kinds offixed form mail stored in said fixed form mail storage means; andautomatic response means for transmitting the fixed form mail selectedby said mail selecting means in response to the same address as atransmitter of the received electronic mail.
 31. An electronic mailsystem according to claim 30, wherein said mail determining meansdetermines whether or not a transmitter address of the receivedelectronic mail coincides with a predetermined address and if there is acoincidence therebetween, said mail selecting means selects a fixed formmail corresponding to the transmitter address from said fixed form mailstorage means.
 32. An electronic mail system according to claim 30,wherein said mail determining means determines whether or not apredetermined password is included in the received electronic mail andif the predetermined password is included, said mail selecting meansselects a fixed form mail corresponding to the password from said fixedform mail storage means.
 33. An electronic mail system according toclaim 30, wherein said mail determining means determines whether or nota transmitter address of the received electronic mail coincides with apredetermined address, if there is a coincidence therebetween, said maildetermining means determines whether or not a predetermined password isincluded in the received electronic mail and if the predeterminedpassword is included, said mail selecting means selects a fixed formmail corresponding to the password from the fixed form mail storagemeans.
 34. An electronic mail system according to claim 30, wherein saidmail determining means determines whether or not a predeterminedpassword is included in the received electronic mail, if thepredetermined password is included, said mail determining meansdetermines whether or not a transmitter address of the receivedelectronic mail coincides with a predetermined address and if there is acoincidence therebetween, said mail selecting means selects a fixed formmail corresponding to the transmitter address from said fixed form mailstorage means.
 35. An electronic mail system comprising: mail receivingmeans for receiving an electronic mail; absence setting means forsetting an apparatus operation in an absence mode; absence noticecreation means for creating a plurality of response conditions fordetermining whether or not an absence notice is issued and the absencenotice having a content corresponding to the plurality of responseconditions; fixed form mail storage means for storing a plurality ofresponse conditions created by said absence notice creation means and aplurality of fixed form mails, one constituting the absence noticecorresponding to the plurality of response conditions; mail attributedetermining means for determining which plurality of response conditionsstored in said fixed form mail storage means attributes of the receivedelectronic mail satisfy when said mail receiving means receives theelectronic mail in the absence mode; and absence notice transmittingmeans for selecting one of fixed form mails stored in said mail storagemeans having a content corresponding to satisfied response conditions toread the fixed form mail from said fixed form mail storage means and totransmit the fixed form mail in response to the same address as atransmitter of the received electronic mail as an absence notice whensaid mail attribute determining means finds the response conditionswhich satisfy the attributes of the received electronic mail.
 36. Acomputer readable storage medium for storing a program for electronicmail processing, the program comprising: (i) step of receiving anelectronic mail; (ii) step of setting an absence mode indicating thestate of absence of a receiver of the electronic mail; (iii) step oftransmitting a predetermined fixed form mail responding to a firstelectronic mail received by the step (i) in the absence mode; (iv) stepof determining whether or not a second electronic mail from a receiverresponding to the predetermined fixed form mail satisfies a specificcondition; and (v) step of transmitting a specific fixed form mail whenit is determined by the step (iv) that the specific condition issatisfied.
 37. A computer readable storage medium for storing a programfor electronic mail processing, the program comprising: (i) step ofreceiving an electronic mail; (ii) step of setting an absence modeindicating the state of absence of a receiver of the electronic mail;(iii) step of transmitting to a third party a predetermined fixed formmail responding to a first electronic mail received by the step (i) inthe absence mode; and (iv) step of causing the step (iii), to transmitthe first electronic mail to a predetermined address when said mailreceiving step receives a second electronic mail responding to thepredetermined fixed form mail and transmitted from the third party andthe second electronic mail satisfies a specific condition.
 38. Acomputer readable storage medium for storing a program for electronicmail processing, the program comprising: (i) step of storing a pluralityof fixed form mails; (ii) step of receiving an electronic mail; (iii)step of designating an address of a specific receiver; (iv) step ofdetermining whether or not a transmitter address of the receivedelectronic mail is an address designated by the step (iii) when theelectronic mail is received by the step (ii); (v) step of selecting oneof fixed form mails stored based on a determination result by the step(iv) from the plurality of fixed form mails stored by the step (i); and(vi) step of transmitting the fixed form mail selected by the step (v)to the same address as a transmitter address of the received electronicmail.
 39. A computer readable storage medium for storing a program forelectronic mail processing, the program comprising: (i) step of storinga plurality of fixed form mails; (ii) step of receiving an electronicmail; (iii) step of determining whether or not a password is included inthe electronic mail when the electronic mail is received by the step(ii); (iv) step of selecting one of fixed form mails from the pluralityof fixed form mails stored by the step (i) based on a determinationresult by the step (iii); and (v) step of transmitting the fixed formmail selected by the step (iv) to the same address as a transmitteraddress of the received electronic mail.
 40. A computer readable storagemedium for storing a program for electronic mail processing, the programcomprising: (i) step of receiving an electronic mail; (ii) step ofdesignating an address of a specific receiver; (iii) step of determiningwhether or not a transmitter address of the received electronic mail isthe address designated by the step (ii) when the electronic mail isreceived by the step (i); (iv) step of transmitting a fixed form mail tothe same address as the transmitter address of the received electronicmail when a determination result by the step (iii) is not the designatedaddress; and (v) step of transferring the received electronic mail to apredetermined address when a determination result by the step (iii) isthe designated address.
 41. A computer readable storage medium forstoring a program for electronic mail processing, the programcomprising: (i) step of receiving an electronic mail; (ii) step ofdetermining whether or not a password is included in the electronic mailwhen the electronic mail is received by the step (i); (iii) step oftransmitting a fixed form mail to the same address as a transmitteraddress of the received electronic mail when the step (ii) determinesthat the password is not included; and (iv) step of transferring thereceived electronic mail to a predetermined address when the step (ii)determines that the password is included.
 42. A computer readablestorage medium for storing a program for electronic mail processing, theprogram comprising: (i) step of receiving an electronic mail; (ii) stepof setting a specific period of time; (iii) step of determining whetheror to the electronic mail is received during the specific period oftime; (iv) step of determining whether or not the electronic mail isreceived during the specific period of time is a response date and timedesignated mail which designates the response date and time; (v) step ofdetermining whether or not the response date and time designated by thereception date and time designated mail is in the specific period oftime; and (vi) step of transmitting a response mail requesting for achange of the response date and time to a different response date andtime except the specific period of time when the response date and timeis in the specific period of time.
 43. A computer readable storagemedium for storing a program for electronic mail processing, the programcomprising: (i) step of receiving an electronic mail; (ii) step ofsetting a specific period of time; (iii) step of determining whether ornot the electronic mail is received during the specific period of timeby the step (i); (iv) step of determining whether or not the electronicmail which is determined to be received during the specific period oftime by the step (iii) is a response date and time designated mail whichdesignates the response date and time; (v) step of determining whetheror not the response date and time is in the specific period of time whenthe electronic mail is determined to be the response date and timedesignated mail by the step (iv); (vi) step of transmitting a requestfor change mail requesting for a change in the response date and time toa different response date and time except the specific period of timewhen the response date and time determined by the step (v) is in thespecific period of time; (vii) step of changing the response date andtime of the response date and time designated mail when a response mailwhich indicates acceptance of the request for a change is received bythe step (i) after the request for change mail is transmitted by thestep (vi); and (viii) step of transferring the response date and timedesignated mail to a predetermined address when a response mail whichrefuses the request for change is received by the step (i) after therequest for change mail is transmitted by the step (vi).
 44. A computerreadable storage medium for storing a program for electronic mailprocessing, the program comprising: (i) step of receiving an electronicmail; (ii) step of setting an apparatus operation in an absence mode;(iii) step of storing a plurality of kinds of fixed form mail to fixedform mail storage means; (iv) step of determining attributes of thereceived electronic mail when the electronic mail is received by thestep (i) in the absence mode set by the step (ii); (v) step of selectingone of fixed form mails from the plurality of kinds of fixed form mailstored in the fixed form mail storage means at the step (iii)corresponding to the attributes determined by the step (iv); and (vi)step of transmitting the fixed form mail selected by the step (v) inresponse to the same address as a transmitter of the received electronicmail.
 45. A computer readable storage medium for storing a program forelectronic mail processing, the program comprising: (i) step ofreceiving an electronic mail; (ii) step of setting an apparatusoperation in an absence mode; (iii) step of creating a plurality ofresponse conditions for determining whether or not an absence notice isissued and the absence notice having a content corresponding to theplurality of response conditions; (iv) step of storing a plurality ofresponse conditions produced by the step (iii) and a plurality of fixedform mails constituting the absence notice corresponding to theplurality of response conditions to fixed form mail storage means; (v)step of determining which plurality of response conditions stored in thefixed form mail storage means attributes of the received electronic mailsatisfy when the electronic mail is received in the absence mode by thestep (i); and (vi) step of selecting one of fixed form mails stored insaid mail storage means having a content corresponding to satisfiedresponse conditions to read the fixed form mail from the fixed form mailstorage means and to transmit the fixed form mail in response to thesame address as a transmitter of the received electronic mail as anabsence notice when the step (v) finds the response conditions whichsatisfy the attributes of the received electronic mail.