Code read communication software

ABSTRACT

A software based process of data and or instruction transfer between intelligent devices and a new data formatting architecture is disclosed which is based on e-mail characteristic formatting to create a code to communicate computer instructions and data between intelligent devices. Intelligent devices are those devices, which are capable of sending and receiving e-mail messages and attachments. This formatting of e-mail characteristics and parameters is a patentable process and it is one of the claims of this application.  
     This software based process will provide screening features, notification features and productivity features specifically targeted to helping individuals or companies in handling incoming and outgoing e-mail and to help individuals or companies to automate and facilitate other common work items. This process includes the creation and storage of e-mail messages, including e-mail messages that contain data and instructions, based on this process, for subsequent transmittal to other intelligent devices.

BACKGROUND OF THE INVENTION

[0001] A software based process and software architecture enhancescommon email programs and changes them into productivity applications byextending the common abilities of an industry standard email softwareprogram to other areas such as automated bill payment, passwordprotected email, controlling of electrical appliances/auxiliary devices,monitoring of input devices, the automated sending of pre-written email,and the screening and sorting of incoming email for further processing.

ABSTRACT OF THE DISCLOSURE

[0002] A software based process of data and instruction transfer betweenintelligent devices and a new data formatting architecture is disclosedwhich is based on e-mail characteristic formatting to create a code tocommunicate computer instructions and data between intelligent devices.Intelligent devices are those devices, which are capable of sending andreceiving e-mail messages and attachments. This formatting of e-mailcharacteristics and parameters is a patent-able process and it is one ofthe claims of this application.

[0003] This software based process will provide screening features,notification features and productivity features specifically targeted tohelping individuals or companies in handling incoming and outgoinge-mail and to help individuals or companies to automate and facilitateother common work items. This process includes the creation and storageof email messages, including email messages that contain data andinstructions, based on this process, for subsequent transmittal to otherintelligent devices.

BRIEF SUMMARY OF THE INVENTION

[0004] This software based process includes and is structured on aproprietary programming language based on e-mail characteristicformatting to create a code to communicate computer instructions betweenintelligent devices. Intelligent devices are those devices, which arecapable of sending and receiving e-mail messages and attachments. Thisformatting of e-mail characteristics and parameters and or thesubseluent screening based on this formatting is a patentable processand it is one of the claims of this application.

[0005] This software will allow a user or a computer device to benotified in a number of ways as a result of a specific incoming e-mailcharacteristic or format. This software will also allow the user tosignal outside parties or computer devices by e-mail, including thatwhich is formatted according to this process and by other means as aresult of either manual user inputs or automated inputs.

[0006] The software based process, which is the subject of thisapplication, may be viewed as a utility type software program, which canbe utilized in the business enterprise market or alternately in the homesoftware market. This software program, Code Read Software (Code Read),includes some new features and some common features. This program andits processes, in contrast to what is commonly found in the currentmarket, is architected to facilitate its productivity features with allcommon standards based email programs and provide productivityenhancements to common email programs. This software based processderives its utility from the use of email and the novel and innovativeuse of email parameters and header characteristics as a programminglanguage and the transmitting of information (data) and instructions viathe formatting of these email items between devices capable of sendingand receiving email.

[0007] This software architecture may also be viewed as an emailoperating system or middleware, which will facilitate the integration ofemail programs and other productivity applications.

[0008] This software program is currently comprised of the followingfive (5) features, which are enabled due to the underlying formattingand subsequent scanning for formatting of email parameters and headercharacteristics. The process of transmitting instructions and data byformatting email parameters, which is the basis of this disclosure, willenable countless features in the future.

[0009] (1) E-Mail Based Bill Payment.

[0010] Prior payment systems were based on either mailing checks to thevendors or were based on the individual having to visit band sites onthe internet or alternately visiting vendor sites and posting payment inone fashion or another. These prior art systems were either timeconsuming or expensive or both.

[0011] (2) The Control of External Devices

[0012] The control of External Devices, which are triggered by screenede-mail, is another feature of Code Read Software and its processes. Anexample would be the remote control of computer-connected appliances.The prior art of controlling home appliances involved a person being onsite or the use of a timer.

[0013] (3) Mystery E-Mail.

[0014] Mystery email uses a password embedded in the email parametersand characteristics and therefore only requires the receiving party todecode the parameters to unlock the email message. In prior art,existing applications had to rely on encryption or OS level controls.This is cumbersome, expensive, complicated and beyond the needs of thegeneral public, who basically have a privacy issue and not a securityissue.

[0015] (4) E-Mail Controlled Alarms and Notifications

[0016] This is the control of computer peripherals by the informationdelivered in e-mail characteristics and parameters. This is a utilitytype software process and will enable this function with any emailprogram. In prior art, only some premium priced email programs had thiscapability.

[0017] (5) Hot button e-mail messages.

[0018] This is the combination of a pre-written email coupled with adevice to trigger the sending of the email message. In prior art, allemails were either written manually at the time of sending or were partof an integrated email application. Canned messages, such as “out ofOffice” replies in MS Outlook, are integrated parts of the emailsoftware. Code Read Software is a utility type program and will workwith all email programs. Alternately, sensors may activate canned emailmessages. In prior art sensors may trip a burglar alarm and then anindividual would have to call the police. This Code Read Softwareprocess and method can send multiple parties messages, neighbors,relatives, police, ambulance and also the owner by way of wirelessemail, providing the owner were away from his property.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING

[0019] The figures listed in this application are FIGS. 1a-1 h and 2-7(14 figures total)

INTRODUCTION TO DRAWINGS

[0020] The Flow diagram included with this application (FIG. 1a) showsthe functions of this software based process as well as the general flowof the user operations. FIGS. 1b illustrates Email Attributes andParameters and further reveals the data capacity of each. FIGS. 1c, 1 d,1 e, 1 f and 1 g illustrate examples of the use of email parameters tocommunicate data. FIG. 1h illustrates Code Read as a middlewarecomponent in the deployment of email productivity applications. FIG. 1ahas items 101-126 identified as components of the flow diagram. FIG. 2shows on overview of some of the program screen modes and features.Drawings 3-7 illustrate potential screen layouts with typical GUI screenarrangements. These screen shots are provided to convey the userinterface concepts and are not a guarantee of the final screen graphicsor layout.

[0021] The complete list of figures for this application is as follows:

[0022]FIG. 1a Program Flow Diagram

[0023] The flow diagram indicates the overall flow and structure of theapplication and its processes. Item numbers 101 to 126 references theflow diagram.

[0024]FIG. 1b Attribute Parameters and Capacities of each

[0025]FIG. 1c Example of “Manual” Firewall Code using Code Read Software

[0026]FIG. 1d Example Of Invoice Information In Firewall Code ReadFormat

[0027]FIG. 1e Example Of XML Type Invoice Formatting Un Code ReadSoftware

[0028]FIG. 1f Example Of “Automated” Encrypted Code Read Firewall Code

[0029]FIG. 1g Example of Code Read Consumer Bill Payment

[0030]FIG. 1h Code Read Software As A Middleware For Email ProductivityApplications

[0031]FIG. 2 Screen Modes

[0032] This figure shows on overview of some of the program features.Following the flow charts,

[0033]FIG. 3 Setup and Configuration Screen Showing E-mail alarm tabactivated

[0034] This figure shows potential screen layouts with typical GUIscreen arrangements.

[0035]FIG. 4 Outgoing Hotbutton Setup

[0036] This figure shows potential screen layouts with typical GUIscreen arrangements.

[0037]FIG. 5 Bill Payment Mode

[0038] This figure shows potential screen layouts with typical GUIscreen arrangements.

[0039]FIG. 6 Associate Alarms actions screen

[0040] This figure shows potential screen layouts with typical GUIscreen arrangements.

[0041]FIG. 7 Mystery Email—Screen Layout

[0042] This figure shows potential screen layouts with typical GUIscreen arrangements.

[0043] Detailed Description of each drawing and its items is as follows:

[0044]FIG. 1a Program Flow Diagram Details

[0045] The purpose of FIG. 1a is to indicate the scope and flow of theCode Read software program and its patentable processes. Items 101through 104 are setup and infrastructure items for the software program.Item 105 is an integral part of the program and the business logic whichis based on the e-mail characteristics and email formatting informationnecessary for this software to function.

[0046] Items 106 through 126 indicate user portion of the program. Item106 is a decision point between a user choosing incoming email oroutgoing email. Items 107 through 116 are incoming email functions anditems 117 through 126 are outgoing email functions.

[0047] The individual items in FIG. 1a are as follows:

[0048]101 Automated Installation Process

[0049]102 Start And Run Program

[0050]103 Configure Program And Screening Parameters By Local Or RemoteMeans Including E-Mail, Network And Web Access

[0051]104 Display Of Current Status For All Program Items And A Log OfProgram Events

[0052]105 A Programming Language And Code Format Specifically DesignedFor The Communication Of Instructions Between Intelligent DevicesCapable Of Receiving E-Mail Messages. (E-Mail Characteristics,Parameters And Messages Contain The Language Codes.)

[0053]106 Decision To Operate On Either Incoming E-Mail Or To Operate OnOutgoing E-Mail

[0054]107 Incoming E-Mail Selection

[0055]108 Read Mystery E-Mail

[0056]109 Scheduler For Log On

[0057]110 Incoming Screening Selection

[0058]111 Incoming Email Alarms And Notifications Initiated

[0059]112 Incoming Email Automated Responses Initiated (ExternalDevices)

[0060]113 Incoming email screening for Invoices For The Bill PaymentSystem

[0061]114 Configure Personal Computer Peripheral Devices As AlarmMechanisms Or As Communications Devices:

[0062] Audio Alarms

[0063] Visual Alarms

[0064] Route E-Mails

[0065] Save E-Mail

[0066] Erase E-Mail

[0067] Dial Designated Phone Numbers

[0068] Send Faxes

[0069] Dial Pagers

[0070] Delete Selected E-Mails

[0071] Write To Logs

[0072] Shut Down Pc

[0073] Create A File Or Folder

[0074] Sort E-Mails & Attachments To Folders & Files

[0075] Miscellaneous

[0076] Send A Network Based Signal

[0077]115 Pci Slot I/O Board Or Equivalent Intelligent Switch OrCommunication Path

[0078]116 External Devices As Alarms Which Are Triggered By ScreenedE-Mail:

[0079] Turn On Or Off An Electrical Circuit

[0080] Turn On Or Off An Optical Circuit

[0081] Adjust An Output Signal

[0082] Print E-Mail

[0083] Implement A Telecom Based Signal

[0084] Miscellaneous

[0085]117 Present E-Mail Bills Or Invoices For Review, Payment OrComment

[0086]118 Outgoing E-Mail Selection

[0087]119 Send Mystery E-Mail Selection

[0088]120 Hotbutton E-Mail Messages Selection

[0089]121 Bill Payment And Scheduler Selection

[0090]122 Input: Password Requirements, Senders Name Block Commands,Alarm Commands, Miscellaneous Commands.

[0091]123 Activation Methods Including For The Handicapped And ByExternal Sensors

[0092]124 Pci Slot I/O Board Inputs

[0093] (Sensor Inputs Which Are Transmitted To A Computer ViaInput/Output Devices)

[0094]125 Operator Inputs for Bill Payment and or Hotbutton Emailmessages

[0095]126 Export Payment Data To Money Or Checkbook Or AccountingSoftware

[0096] The individual items in FIG. 1b are as follows:

[0097]200 “From” email attribute parameter. In an email message, the“From” item usually contains the email address of the sender of theemail message.

[0098]201 “To” email attribute parameter. In an email message, the “To”item usually contains the intended recipient of the email message.

[0099]202 “CC” email attribute parameter. In an email message, the “CC”item usually contains the email address information of individuals whoare to be copied with the email message.

[0100]203 “BCC” email attribute parameter. In an email message, the“BCC” item usually contains the email address information of individualswho are to be copied with the email message, but the copy is to beblind. Blind copy refers to the fact that the intended recipient isblind to the fact that another copy was sent to the “BCC” email address.

[0101]204 “SUBJECT” email attribute parameter. In an e-mail message, the“SUBJECT” item usually contains the e-mail title information. It isuseful to assist the recipient and others with organizing andrecognizing the intended purpose of the email.

[0102]205 “ATTACHMENT” email attribute parameter. In an e-mail message,the “ATTACHMENT” item usually contains the file names of files, whichare attached to an email message. It is useful to assist the recipientand others with organizing and recognizing the files, which accompany ane-mail message.

[0103] The individual items in FIG. 1c are as follows:

[0104]204 “SUBJECT” email attribute parameter.

[0105]205 “ATTACHMENT” email attribute parameter.

[0106]206 “**FWC10000** Hello from Texas” is an example of an emailsubject serving as an Code Read data or instruction format.

[0107]207 “ABCD.doc” is an example of an email attachment file name.

[0108] The individual items in FIG. 1d are as follows:

[0109]204 “SUBJECT” email attribute parameter.

[0110]205 “ATTACHMENT” email attribute parameter.

[0111]208 “****COMPANY NAME+++UNIQUE IDENTIFIER NUMBER++++INVOICEDOCUMENT++++INVOICE NUMBER++++DATE DUE++++AMOUNT DUE++++EXISTINGBALANCE++++DATE OF LAST PAYMENT++++DISCOUNT AVAILABLE FOR EARLY PAYMENTBY XXXXX DATE++++****” is an example of an email subject shown as anexample of invoice data information contained in Code Read format.

[0112]209 “ABC Document.doc” ” is an example of an e-mail attachmentfile name.

[0113] The individual items in FIG. 1e are as follows:

[0114]204 “SUBJECT” email attribute parameter.

[0115]210 “**** <COMPANY NAME> 100 +++ <UNIQUE IDENTIFIER NUMBER> 200++++<INVOICE DOCUMENT> 300 ++++<INVOICE NUMBER >400 ++++ <DATE DUE> 500++++<AMOUNT DUE> 600++++<EXISTING BALANCE> 700++++<DATE OF LAST PAYMENT>800++++<DISCOUNT AVAILABLE FOR EARLY PAYMENT BY> 900 XXXXX <DATE>1000++++****” is an example of an email subject with XML type invoiceformatting.

[0116] The individual items in FIG. 1f are as follows:

[0117]204 “SUBJECT” email attribute parameter.

[0118]211“1245890093903+++−−−−−−−−!!)0jm5901110022929292393903+++−−−−−−−−!!)0jm5979879812981019209338376378383989898988899998888kakakkddjdhdggdbcmc9c786ghedbenckc949+++−−−−−−−−!!)0jm5998743hdf94”is an example of an e-mail subject which is encrypted and contains data,instructions or both.

[0119] The individual items in FIG. 1 g are as follows:

[0120]212 Customer selects invoices for payment.

[0121]213 Customer authorizes payment by pushing this button.

[0122] The individual items in FIG. 1h are as follows:

[0123]214 Email Productivity applications

[0124]215 Code Read Software

[0125]216 Generic Email System

[0126]217 Generic Disk Operating System

[0127]218 Generic Personal Computer Or Email Hardware Device

DETAILED DESCRIPTION OF THE INVENTION

[0128] Code Read Communication Software—Structure

[0129] This software program and language depends on and includes theprocess of the formatting and or the screening of e-mail messageattribute parameters including but not limited to: From, To, CC, BCC,SUBJECT, ATTACHMENTS and, EMAIL MESSAGE, etc as a means to communicateinstructions between intelligent devices via e-mail. See Figure(200-205)

[0130] The software program and its process of screening e-mail messagesparameters for specific formatting, which is the subjects of this patentapplication, may be structured as a separate “add on” utility softwarepackage or it may be integrated as part of another E-mail or browsersoftware such as Internet Explorer, AOL, Netscape Navigator, hotmail,NetZero, Microsoft Outlook, Lotus Notes, or any other commercialproduct.

[0131] Code Read Communication Software Language

[0132] This software program and its processes will be coded in acurrent language such as but not limited to: Visual Basic, C++ or Javaand will operate with the popular operating systems including but notlimited to: Windows, Unix and Unix derivatives, Apple and IBM and Unisysmainframe operating systems.

[0133] This software program and its processes will be structured so asto install in an automated fashion onto a users personal computer orintelligent device.

[0134] Code Read Communication Software Features

[0135] Some of the features, which this software process will enable,are as follows:

[0136] The automatic process of scanning incoming e-mail messageattributes for data and instructions and processing the data andinstructions based on the user inputs, or programming, which is enteredinto the Code Read Software application.

[0137]  See FIG. 1a, Items (103) and (105).

[0138]  See FIG. 1b (200-205)

[0139]  See FIG. 1c (206), (207)

[0140]  See FIG. 1d

[0141] Automating the scheduling of an e-mail session via network ortelecom or wireless connections to the internet to a allow automaticprocesses in this same software to scan and process incoming e-mailmessages

[0142]  See FIG. 1a, Items (109)

[0143] Associating and activating alarms and notifications based one-mail parameters and characteristics.

[0144]  See FIG. 1a, Items (103),(111) and (114).

[0145]  See FIG. 3

[0146] Select screening criteria (219)

[0147] Select alarm type (220)

[0148] Review alarm states (221)

[0149] Providing preformatted and addressed outgoing e-mail forindividuals or companies to handle emergency and urgent messages andnotifications

[0150]  See FIG. 1a, Items (120) and (125).

[0151]  See FIG. 4

[0152] Create new hotbutton email (222) and review active hot buttons(223)

[0153] Providing a link for triggering mechanisms for the sending ofoutgoing preformatted and addressed emergency e-mails by:

[0154] a) Conventional methods such as keyboard or mouse

[0155] b) Unconventional methods such as a handicapped person would

[0156] c) By automatic means to sense signals originating from sensorsand appliances.

[0157]  See FIG. 1a, Items (123) (124) and (120).

[0158]  See FIG. 4 (224)

[0159] Screening incoming e-mail and sorting and directing vendor andinvoice related incoming e-mails for payment and providing a mechanismfor authorizing payments to vendors via e-mail messages

[0160]  See FIG. 1a, Items (110),(113),(117),(126)and (121)

[0161]  See FIG. 5

[0162] Process incoming invoices (225) and review current statusaccounts (226)

[0163]  See FIG. 1b (200-25)

[0164] Using incoming e-mail parameters and characteristics to activateother appliances as well as other PC functions, intelligent devices andsoftware programs

[0165]  See FIG. 1a, Items (112),(115)and (116)

[0166]  See FIG. 6

[0167] Associate alarm actions (227) and review active alarms status(228)

[0168]  See FIG. 1b (200-205)

[0169] Password protecting e-mail and transmitting the password withinthe e-mail parameters and header information.

[0170]  See FIG. 1a, Items 108,122,119

[0171]  See FIG. 7

[0172] Create new password protected emails (229). Send passwordprotected emails (230). Enter password information and read incomingmystery emails (231).

[0173] Automated Installation of the program

[0174]  See FIG. 1a, Items (101)

[0175] Display of all items and a log of program activity

[0176]  See FIG. 1a, Items (104)

[0177] Provide mechanisms whereby this software program can beconfigured and activated by a variety of methods including but notlimited to local items such as keyboards, mouse, touch screen, touchpad, retina tracking or by remote methods including but not limited toe-mail, web access, network access, telecommunications access, opticalcommunications, satellite communications or wireless communications.

[0178]  See FIG. 1a, Items (118), 120,123,124,125

[0179] See FIG. 4This program will be displayed in various screen modeswhich are operator controlled

[0180]  See FIG. 2

[0181] Examples of the Use of Code Read Software

[0182] Examples of uses of this invention with incoming e-mail are:

[0183] 1 A specific incoming e-mail that contains a parameter that thisprogram is looking for such as the senders e-mail address isjohn.doe@main.com. See FIG. 1b (200)

[0184] This would signal the personal computer, using this program, toautomatically print the incoming e-mail, or forward it to a group of endusers working on a project.

[0185]  See FIG. 1a, Items 17,110,111,114

[0186]  See FIG. 3 (219) (220) (221)

[0187] 2) A specific incoming e-mail would signal the personal computer,using this program, to issue a continuous phone ring sound when and onlywhen an e-mail with the word ACME in the senders e-mail subject line isreceived. See FIG. 1b (200)

[0188]  See FIG. 1a, Items 17,110,111,114

[0189]  See FIG. 3

[0190] 3) a specific incoming e-mail, which was detected by thissoftware program, would signal an electrical contact to be closed andresult in an electrical appliance being turned on. This software programwould implement this action by sending a software signal to the personalcomputer i/o card which resides in a pci slot. The i/o card would closecontacts to allow the flow of current to be turned on or off based on anincoming e-mail.

[0191]  See FIG. 1a, Items 117,110,115 and 116

[0192]  See FIG. 6 (227) (228)

[0193] 4) A specific incoming e-mail, which was detected by thissoftware program, would screen and identify the e-mail as a bill from avendor FIG. 1b (200) and sort it into a folder to be processed by theuser at bill payment time. The customer or user of this program wouldonly have to reply back to the vendor by reply e-mail FIG. 5 (225) thatthe invoice is accurate and approval is issued for a transfer of fundsby a prearranged payment vehicle such as a credit card number, which isin possession of the vendor.

[0194]  See FIG. 1a, Items, 110,113,117,121 and 125

[0195]  See FIG. 1d

[0196]  See FIG. 1e

[0197]  See FIG. 1g

[0198]  See FIG. 5 (225) (226)

[0199] Examples of uses of this invention with outgoing e-mail are:

[0200] 1) A person is having a heart attack. He clicks on the Hot Buttonon his computer to send and e-mail to a 911 facility regarding a heartattack FIG. 4 (223). Hot Button outgoing e-mails are pre-typed, preaddressed automated e-mails for fast, accurate notification in the eventof an emergency or urgent action request. The transmission of theseoutgoing e-mails may be initiated by many means including a mouse click.The advantage to the user is he

[0201]  doesn't have to call 911 and then give his information, thencall the doctor to come to the hospital, then call his wife to tell herwhere he is going, then call a neighbor who could offer CPR until theambulance arrives. The 4 calls in this example would be replaced withone click of the mouse. The receiving computers, when set up with thissoftware would receive a loud verbal alarm when this message appeared attheir computer. This software could also initiate multiple phone calls wsynthesized voice messages as well as faxes and pager alerts.

[0202]  See FIG. 1a, Items 118,120,123,125

[0203]  See FIG. 4, (222), (223), (224)

[0204] 2) A burglar alarm signals a personal computer via an i/o card ina pci slot in the computer. An e-mail containing all the homeownerinformation would be issued to the proper authorities to respond to thealarm.

[0205]  See FIG. 1a, Items 118,120,123,124,125

[0206]  See FIG. 6 (227), (228)

[0207] 3) An inventory of items like medicine, which were scanned asthey were used, would signal the computer input/output card in a PCIslot in a personal computer. The e-mail response would signal a reorderof the medicine in this example.

[0208]  See FIG. 1a, Items 118,120,123,124,125

[0209]  See FIG. 6 (227), (228)

[0210] 4) A user wants to send and e-mail with a password requirement.He opens the mystery mail feature in this software and enters thepassword. The recipient must have the password to open and read themessage or attachment.

[0211]  See FIG. 1a, Items 122,119,118

[0212]  See FIG. 7 (229), (230), (231)

I claim:
 1. The Process of E-mail communicating instructions and or databetween intelligent devices capable of sending and receiving e-mailmessages comprising: (a) The formatting of e-mail message parameters toprovide the ability to sort and further process incoming e-mail messagesand to communicate instructions and or data to an intelligent device(s)via the e-mail transaction including, but not limited to, one or more ofthe following parameters: e-mail author (From), e-mail recipient (To),subject of e-mail message (Subject feature), copied entities (CCfeature), blind copied entities (Bcc feature), e-mail message filecharacteristics, e-mail message content, attachment file names andattachment content. (b) The screening of e-mail message parameters toprovide the ability to sort and further process incoming e-mail messagesand to communicate instructions and or data to an intelligent device(s)via the e-mail transaction including, but not limited to, one or more ofthe following parameters: e-mail author (From), e-mail recipient (To),subject of e-mail message (Subject feature), copied entities (CCfeature), blind copied entities (Bcc feature), e-mail message filecharacteristics, e-mail message content, attachment file names andattachment content. (c) The Automatic and or manual Screening and orformatting of e-mail messages parameters for the purpose ofcommunicating instructions and or data with e-mail and or e-mailtransactions. (d) The formatting and or screening of email messageparameters manually or automatically, to convey and communicateinstructions and or data to remote systems or intelligent devices, whichreceive the e-mail messages or which subsequently communicate with thee-mail receiving device. (e) The use of a combination of e-mailparameters and message content within an e-mail message or within acombination of e-mail messages, which together act as a programminglanguage or as a means to communicate instructions and or data from oneintelligent device to another.
 2. The process of claim 1, wherein thesaid “further process incoming e-mail messages” means the use of thisprocess to communicate data and or instructions to Computer SystemPeripheral Devices or to Intelligent Device Peripherals.
 3. The processof claim 1, wherein the said formatting of e-mail message parametersmeans the formatting of outgoing e-mail which includes e-mail going toany second intelligent device or any e-mail address whether it is inanother location or simply in another location within the sameintelligent device.
 4. The process of claim 1 wherein said ability tosort and further process incoming e-mail messages and to communicatedata and instructions to an intelligent device(s) via the e-mailtransaction means the process of Automated Bill Payment by the screeningand sorting of incoming e-mail messages for invoices and bills and thesubsequent sending of e-mail authorizations to the vendors who alreadypossess the secure payment means and or information of a customer. 5.The process of claim 1 wherein said communicating instructions and ordata means the means to control external devices, which are connected insome fashion to a computer or intelligent device capable of receivinge-mail messages
 6. The process of claim 1 wherein said communicatinginstructions and or data means the ability to send and receive passwordprotect e-mail messages with the password information residing in thee-mail parameter formatting as data and or instructions.
 7. The processof claim 1 wherein said programming language means a softwareArchitecture consisting of the structuring and formatting of one or moree-mails and their parameters as a code which will communicateinstructions and or data to a remote computer or intelligent devicewhich is capable of receiving e-mail messages.
 8. The process of claim 1wherein said sort and further process incoming e-mail messages means theability to create an e-mail workflow process.
 9. The process of claim 1wherein said user is provided with a detailed display, status and log ofpast and current alarm conditions.
 10. The process of claim 1 whereinsaid user is provided with means to Operate, configure and Setup thisprogram and its parameters and variables by local and by remote means.11. The process of claim 1 wherein said user is provided with means foran assortment of screen modes, which are options for the operator. 12.The process of claim 1 wherein said user is provided with means for anassortment of screen modes, which are options for the operator.
 13. Asoftware Process of Automating the creation and storage of e-mailmessages which will be sent at a later time comprising: (a) The means tocreate and store complete e-mail messages, which can be sent manually,or which can be sent in an automated fashion. (b) The means to associateconditions to trigger and send a stored e-mail message (c) The means toprovide and implement manual inputs to trigger and send a stored e-mailmessage (d) The means to provide automated inputs to trigger and send astored e-mail message (e) The means to trigger the subsequenttransmittal of the e-mail messages.
 14. The process of claim 13 wherein,said creation and storage of e-mail message means formatting in thee-mail parameters or a combination of the e-mail parameters and thee-mail message for the purpose of transmitting data and or instructionto another device.
 15. The process of claim 13 wherein said Means toassociate conditions to trigger and send a stored e-mail message meansthat stored e-mail messages are sent in response to sensors or otherinputs means.
 16. The process of claim 13 wherein said storage of e-mailmessages means e-mail messages with instructions and or data formattedinto the e-mail parameters and the e-mail message and or computersoftware code, which is formatted in the e-mail parameters and thee-mail message.
 17. The process of claim 13 wherein said user isprovided with a detailed display, status and log of past and currenttrigger conditions.
 18. The process of claim 13 wherein said user isprovided with the Operation, configuration and Setup capabilities forthis program and its parameters and variables by local and by remotemeans.
 19. The process of claim 13 wherein said user is provided with anassortment of screen modes, which are options for the operator.
 20. Theprocess of claim 13 wherein said user is provided with an assortment ofscreen modes, which are options for the operator.