System and method for pin-to-pin network communications

ABSTRACT

A system and method is provided for enabling wireless access to a computer network via communication between a remote (client) wireless device and a wireless device physically linked to the computer network. A bank of one or more wireless gateway devices may be cradled and connected to a network server. The wireless gateway devices may then act as a node on the wireless network, and remote wireless devices may send and receive messages to and from the wireless gateway devices using PIN-to-PIN messaging. The wireless gateway devices, when cradled, may communicate with any attached server or other network equipment, and may therefore act as a wireless gateway to the server or other network equipment.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 10/892,243, entitled “System and Method for PIN-to-PIN Network Communications,” filed Jul. 16, 2004, which claims the benefit of U.S. Provisional Patent Application Ser. No. 60/488,005, entitled “System and Method for Wireless PIN-to-PIN Network Communications,” filed Jul. 18, 2003, the contents of which are hereby incorporated by reference in their entirety.

FIELD OF THE INVENTION

This invention relates to a system and method for enabling wireless access to a computer network via communication between a remote (client) wireless device and a wireless device physically linked to the computer network.

BACKGROUND OF THE INVENTION

Wireless computing devices such as, for example, the BlackBerry™ hand-held device by Research in Motion Limited, typically provide users with wireless access to important enterprise information. System infrastructures (or architectures) supporting such devices may generally comprise a wireless network, a carrier gateway, an enterprise gateway (e.g., the BlackBerry™ Enterprise Server or “BES”), and other back-end servers (e.g., Exchange, DB systems, document management systems, etc.), or other components.

Wireless servers, such as Onset Technology's METAmessage server, may be provided to further enhance the features and functionality of known wireless systems (such as the BlackBerry™ system) by enabling users to access and manage information—data from document management programs, voicemail, SQL/ODBC databases, and CRM/ERP applications, email attachments, network files, web pages, contact information, etc.—from their wireless device.

In disaster scenarios, such as that of Sep. 11, 2001, various components of a system infrastructure necessary to access important enterprise information from a wireless device may become unavailable. Connectivity to an enterprise may be lost, or back end systems such as BES and Exchange may not function. While wireless devices and wireless networks (e.g., the pager Mobitex and DataTAC networks) may operate, as was the case on Sep. 11, 2001, they may still be ineffective if other components of the system infrastructure do not function.

Certain wireless devices have a dedicated device number or personal identification number (“PIN”), which may serve as the device's identifier on a network. PINs also enable wireless devices on a network to communicate with one another via PIN-to-PIN messaging (i.e., messages communication from one PIN identifier to another PIN identifier). This form of communication may occur from device to device through the wireless network, and without the need for a carrier gateway, enterprise gateway, or other system or server. This form of communication may also be quite valuable in the event of a disaster or other scenario if various components of a system infrastructure are compromised. One drawback associated with PIN-to-PIN messaging, however, is that a user must typically know the PIN address of the wireless device of a user that he or she wishes to communicate with. This may be an unlikely occurrence, as most users tend to remember e-mail addresses and/or telephone numbers for contacts, and not the PIN addresses of their wireless devices. These and other drawbacks exist.

SUMMARY OF THE INVENTION

The invention solving these and other problems relates to a system and method for enabling wireless access to a computer network via communication between a remote (client) wireless device and a wireless device physically linked to the computer network.

One embodiment of the invention enables users to retrieve the personal identification number (“PIN”) addresses of other wireless devices, as well as interact with designated database systems, file directories, or other back end systems, even if portions of the system infrastructure are unavailable.

According to an embodiment of the invention, a bank of one or more wireless devices may be cradled and connected to the network, a METAmessage server provided by Onset Technology, Inc., or other back-end server. For convenience, these cradled devices will be referred to herein as “wireless gateway devices.” The wireless gateway devices may then act as a node on the wireless network, and remote wireless devices may send and receive messages to and from the wireless gateway devices using PIN-to-PIN messaging. The wireless gateway devices, when cradled, may communicate with any attached server or other network equipment, and may therefore act as a wireless gateway to the server or other network equipment. Accordingly, one or more components of the system architecture that may be unavailable may be bypassed, and a direct link from the devices to the network equipment may be provided.

According to one embodiment, the addresses of the wireless gateway devices may be stored in a remote wireless device, or may be transmitted in case of emergency to the remote wireless device through a PIN-to-PIN message. The remote wireless device, which typically communicates with the enterprise systems through email or other data channels, may switch to PIN-to-PIN messaging either manually, through operation of the user, or automatically, in response to a received PIN-to-PIN message. The remote wireless device may store multiple addresses of wireless gateway devices, and may send each communication to more than one of those wireless gateway devices, for redundancy purposes. According to one embodiment, multiple METAmessage servers may be provided in different locations, to further make the solution redundant. The wireless gateway devices may be served by different wireless networks, for further redundancy.

According to an embodiment of the invention, a user of a remote wireless device may have access to any information on the METAmessage (or other) server, or on any devices connected to it. As one example, a fax server provided with (or connected to) the METAmessage server, or even just a fax card, may provide the additional functionality of enabling users to print any of the information to any fax machine. This further enhances the solution to support lengthy documents that may not be easily read on the remote wireless device.

These and other objects, features, and advantages of the invention will be apparent through the detailed description of the preferred embodiments and the drawings attached hereto. It is also to be understood that both the foregoing general description and the following detailed description are exemplary and not restrictive of the scope of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a wireless system infrastructure (or architecture) supporting communication from wireless devices to an enterprise or other network through carrier and enterprise gateways.

FIG. 2 is an exemplary illustration of a system architecture for enabling PIN-to-PIN communication between remote wireless devices to facilitate continued transmission of information during or after a disaster or disruptive event, according to an embodiment of the invention.

FIG. 3 illustrates a flowchart of processing according to the invention, in one regard.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

With regard to FIG. 1, a system infrastructure 100 (or architecture) is illustrated for supporting one or more remote wireless devices (160 a-160 n). A remote wireless device (160 a-160 n) may include any device capable of sending and receiving information through a wireless network including, but not limited to, a Blackberry™ personal digital assistant (PDA), pager, laptop, cell phone, or other wireless device. System infrastructure 100 may comprise a wireless network 150 (e.g., the pager Mobitex or DataTAC networks, etc.), a carrier gateway 140, an enterprise gateway 130 (e.g., the BlackBerry™ Enterprise Server), and a computer network 110 (e.g., a corporate or other network). In some embodiments, a firewall 124 may be provided to prevent unauthorized access to or from computer network 110.

Computer network 110 may further comprise one or more “back-end” servers (e.g., a Microsoft Exchange server), database systems, document management systems, or other servers or components. As an example, a wireless server 120, such as Onset Technology's METAmessage server, may be provided to enable users to access and manage information—data from document management programs, voicemail, SQL/ODBC databases, and CRM/ERP applications, email attachments, network files, web pages, contact information, etc.—from their respective wireless device (160 a-160 n).

In the event that system infrastructure 100 is disrupted (e.g., there is a loss of ability to communicate with “back-end” servers through carrier gateway 140 and/or enterprise gateway 130), an embodiment of the invention enables remote wireless devices (160 a-160 n) themselves to be used to facilitate communication with back end servers or other network equipment.

According to an embodiment of the invention illustrated in FIG. 2, an exemplary illustration of a system infrastructure 200 (or architecture) is provided for enabling wireless access to computer network 110 via communication between remote wireless devices (160 a-160 n) and one or more wireless gateway devices (170 a-170 n) physically linked to computer network 110.

In one implementation, PIN-to-PIN messaging may be used to bypass one or more components of system infrastructure 200. As recited above, PIN-to-PIN messaging refers to the transmission of information from one remote wireless device (e.g., 160 a-160 n) to another (e.g., 160 a-160 n-or-170 a-170 n) over a wireless network 150. This communication may be accomplished through the use of dedicated personal identification number (“PIN”) identifiers (or addresses) associated with wireless devices (i.e., communicating message from one PIN identifier or address to another PIN identifier or address). PIN identifiers may comprise any indicator that serves to identify a particular wireless device on a wireless network. Wireless network 150 may comprise any known network including, but not limited to, Mobitex, DataTAC, or GPRS. Those having skill in the art understand that the nature of wireless devices is such that any particular wireless device may act as both a transmitter or a receiver.

PIN-to-PIN messages are not limited to those sent over the BlackBerry™ pager network (e.g., Mobitex and DataTAC). They may include other types of messages that are sent from one device to another device, bypassing the carrier to enterprise link. For example, SMS messages used by cell phones are also PIN-to-PIN messages.

According to an embodiment of the invention, PIN-to-PIN messaging may be used to bypass traditional network infrastructure via one or more wireless gateway devices (170 a-170 n). Similar to remote wireless devices (160 a-160 n), a wireless gateway device (170 a-170 n) may include any device capable of sending and receiving information through a wireless network including, but not limited to, a Blackberry™, personal digital assistant (PDA), pager, laptop, cell phone, or other wireless device.

According to an embodiment, a wireless gateway device (170 a-170 n) may be connected to one or more components of computer network 110 via a cradle or other similar mechanism. A cradle may comprise any device capable of physically connecting the circuitry of one electronic device (e.g., a wireless gateway device 170 a-170 n) to the circuitry of another electronic device (e.g., a wireless server 120). In one implementation, wireless server 120 may be serially connected to one or more cradled wireless gateway devices (170 a-170 n). Wireless server 120 may further either host or connect to any number of other servers, databases, or information sources such as, for example, a contact information database, emergency procedure files, or other enterprise applications.

According to an embodiment of the invention, wireless server 120 may comprise a METAmessage server provided by Onset Technology, Inc. As recited above, a METAmessage server may enhance the features and functionality of known wireless systems (such as the BlackBerry™ system) by enabling users to access and manage information—data from document management programs, voicemail, SQL/ODBC databases, and CRM/ERP applications, email attachments, network files, web pages, contact information, etc.—from their wireless device.

To increase the reliability of PIN-to-PIN messaging, and/or PIN-to-PIN access to computer network 110 (or to another network or enterprise), multiple wireless gateway devices (170 a-170 n) may be cradled and used for transmitting information to and from remote wireless devices (160 a-160 n) in the event that one or more of the wireless gateway devices (170 a-170 n) becomes inoperable or inaccessible. Further, multiple wireless servers 120 (or other servers) with accompanying wireless gateway devices may be placed in multiple locations to increase the redundancy of the system. Redundancy may be yet further increased by using multiple wireless networks 150 for the transmission of PIN-to-PIN messages between remote wireless devices (160 a-160 n) and wireless gateway devices (170 a-170 n). If the wireless networks of one or more wireless gateway devices become inoperable, inaccessible, or otherwise unavailable, for any reason, wireless gateway devices operating on other wireless networks may take their place.

Having provided an overview of various embodiments of system infrastructure 200, a description of the various features and functionalities of the invention with regard to PIN-to-PIN messaging, and/or PIN-to-PIN access to a computer network or networks will now be described. It should be understood that wireless server 120, remote wireless devices (160 a-160 n), wireless gateway devices (170 a-170 n), or other servers or components of system infrastructure 200 may include various software modules to accomplish the functionalities described herein. In other embodiments, as would be appreciated, the functionalities described herein may be implemented in various combinations of hardware and/or firmware, in addition to, or instead of, software.

According to an embodiment of the invention, users of remote wireless devices (160 a-160 n) may elect whether to use the PIN-to-PIN function of the device for either PIN-to-PIN messaging or PIN-to-PIN access to a component (e.g., a server) of computer network 110. If this function is elected, a user needs to know or should be able to conveniently access the PIN address of a target device or system component.

In one embodiment, if PIN-to-PIN messaging is desired or needed to bypass unavailable components of system infrastructure 200, wireless gateway devices (170 a-170 n) may send initial PIN-to-PIN messages to remote wireless devices (160 a-160 n) to provide the devices with the PIN identifiers (or addresses) for one or more of wireless gateway devices (170 a-170 n). The initial PIN-to-PIN messages may also be used to alert users of the need (e.g., in case of an emergency) to switch to PIN-to-PIN communication. PIN addresses of one or more wireless gateway devices (170 a-170 n) needed for access to computer network 110 may also be stored on the remote wireless devices (160 a-160 n) and may be updated wirelessly from wireless server 120 (e.g., a METAmessage server) or from another server.

According to an embodiment of the invention, when one or more components of a traditional infrastructure (e.g., carrier gateway 140 or enterprise gateway 130 of system infrastructure 100 in FIG. 1) becomes unavailable, PIN-to-PIN communication may be initiated manually by the users of remote wireless devices (160 a-160 n).

In an alternative embodiment of the invention, remote wireless devices (160 a-160 n) may be automatically switched to PIN-to-PIN communication through, for example, a PIN-to-PIN message sent by wireless server 120 or other server. Client software on remote wireless devices (160 a-160 n) may monitor incoming messages and, when such a switching message arrives, switch the sending (or other communications) protocol of the device to PIN-to-PIN mode.

In some embodiments of the invention, a “notification” module may be located on wireless server 120 or on another server of computer network 110. The notification module may store the PIN addresses of one or more remote wireless devices (160 a-160 n) and wireless gateway devices (170 a-170 n) on the network. The notification module may also facilitate notification to remote wireless device users that PIN-to-PIN communication is necessary (e.g., if one or more components of the system infrastructure becomes unavailable).

The notification module may also facilitate the distribution and maintenance of wireless gateway PIN addresses to remote wireless devices (160 a-160 n). Furthermore, the notification module may facilitate an automatic “switch” of remote wireless devices from normal communication to a PIN-to-PIN communication mode. The PIN addresses of remote wireless devices (160 a-160 n) and wireless gateway devices (170 a-170 n) may be changed or updated in the event that devices of any kind are added to, or removed from, the system. The notification module may also facilitate the determination of wireless gateway device availability.

According to one embodiment, remote wireless devices (160 a-160 n) may enable users to choose the wireless gateway devices (170 a-170 n) with which to communicate. Alternatively, the remote wireless devices (160 a-160 n) may automatically select particular wireless gateway devices (170 a-170 n) according to their type and/or availability, the type and/or availability of the wireless network 150, or other criteria. Remote wireless devices (160 a-160 n) may send single communications to an enterprise or other network through multiple wireless gateway devices simultaneously, further increasing system redundancy.

It should be understood from the various embodiments described above that for either PIN-to-PIN messaging or PIN-to-PIN access to a component (e.g., a server) of computer network 110, a user should be able to conveniently access the PIN address of a target device or system component. As such, in various embodiments, PIN addresses may be stored on either one or more of wireless server 120 (e.g., a METAmessage server) or other servers of computer network 110, on one or more of wireless gateway devices (170 a-170 n), or in the address books (or other directory files) stored on remote wireless devices (160 a-160 n). As recited above, in those embodiments wherein PIN addresses are stored on remote wireless devices (160 a-160 n), the addresses may be updated wirelessly from wireless server 120 (e.g., a METAmessage server) or from another server, from wireless gateway devices (170 a-170 n), or even from other remote wireless devices (160 a-160 n). Alternative configurations may be implemented.

According to one embodiment, a PIN look-up feature may be provided enabling users to automatically update the address books of their remote wireless device with PIN addresses. A user may send a request with a partial name or initials (or other information) for a contact for which information is desired, and either wireless server 120, wireless gateway devices (170 a-170 n), or other system servers or components may then reply with the desired contact information, and/or an option to update the user's handheld address book. Multiple matches may be accommodated by enabling a user to choose from a list of possible matches. If an identified contact has a PIN registered on the network, the PIN may be included with the contact information. In various implementations, access to contact information may be dependent upon on a user's network access rights, or subject to a security protocol.

According to an embodiment of the invention, a PIN update feature may be enabled. With Automatic PIN Updating, a user may request PINs for every user on the network. An administrator may configure wireless server 120 (or other server) to either update only existing address book entries for a user, or to update existing entries and add entries that exist on the network but that are not yet in the user's address book.

According to an embodiment of the invention, PIN-to-PIN archiving functionality may be provided. As an example, administrators in sensitive sectors often disable PIN-to-PIN messaging due to regulations requiring that all messages such as e-mail be recorded or archived. In such instances, handheld wireless devices may be left unused in an emergency if the email server or other network infrastructure were down. According to an embodiment, wireless server 120 (or another system component) may enable administrators to archive PIN-to-PIN messages as a default protocol under normal conditions such that, in an emergency, the feature is enabled and handhelds are available for emergency communications. Upon sending a PIN message, content including “To:, CC:, and BCC:” information may be copied and sent via e-mail to a pre-determined address selected by an administrator or other individual. The message may then be processed with whatever method or tool that is configured by the administrator.

According to an embodiment of the invention, a “message blast” feature may be enabled. In an emergency, messages often have to go out to special categories of workers. As an example, one notification may be transmitted to all office managers, while another message may be sent to field personnel, etc. Since these individuals may utilize a variety of devices (e.g., BlackBerry handhelds using email or PIN-to-PIN messaging, pocket PCs, cell phones, desktop PCs, even fax machines), wireless server 120 (e.g., a METAmessage server) may enable, for example, a BlackBerry user to send one message to many addressees regardless of their device. The user may have access to three types of groups: a group of addresses created by an administrator; an existing BlackBerry Address Book group; and, a manually entered group. After selecting a group, a user may compose and send a message.

According to an embodiment of the invention, an “instant conference call” feature may be enabled for those users whose remote wireless device (160 a-160 n) is voice-enabled. This feature may enable a user to quickly set up a conference call by choosing from a list of pre-defined groups on, for example, their BlackBerry handheld, by selecting participants from the address book, or by entering new numbers. Working with either a local or hosted voice gateway, wireless server 120 may call and connects the intended participants, including the initiating user.

In addition to the foregoing description, FIG. 3 illustrates a flowchart of processing according to the invention, in one regard. The following operations may be accomplished using all or some of the of the system components described in detail above, and may incorporate all of the features and functionality of the invention as set forth in the foregoing description and accompanying drawing figures.

In an operation 300, a wireless system infrastructure (or architecture) supporting communication from wireless devices to an enterprise or other network through carrier and enterprise gateways, for example, may be functioning normally.

In an operation 304, a determination may be made as to whether the wireless system infrastructure (or architecture) is available and functioning properly. If the system is functioning properly, it may be said to be in a “normal mode.” If, however, it is determined in operation 304 that an emergency or other event (or series of events) has resulted in one or more components of the wireless system infrastructure (or architecture) becoming unavailable, or if use of the wireless system infrastructure is undesirable, a determination may be made, in an operation 308, as to whether remote wireless devices may be automatically switched to PIN-to-PIN communication.

If it is determined in operation 308 that remote wireless devices should automatically be switched to PIN-to-PIN communication, a PIN-to-PIN communication may be sent by a server, wireless gateway device, or other server or device to a user's remote wireless device in an operation 312. Client software on the remote wireless device may monitor incoming messages and, when such a switching message arrives, switch the sending (or other communications) protocol of the device to PIN-to-PIN mode (340) in an operation 316.

By contrast, if it is determined in operation 308 that an automatic switch to PIN-to-PIN mode may not be required, a PIN-to-PIN communication may be sent by a server, wireless gateway device, or other server or device to a user's remote wireless device, in an operation 320, notifying the user of the necessity or desirability of enabling PIN-to-PIN messaging or PIN-to-PIN access to a component (e.g., a server) of computer network.

In an operation 324, a determination may be made by a user as to whether to initiate PIN-to-PIN communication. If a user elects to initiate PIN-to-PIN communication, a determination may be made in an operation 328 as to whether PIN-to-PIN messaging or other PIN-to-PIN communication may be used only for a current communication (e.g., a user needs to send one e-mail message).

If it is determined, in operation 328, that PIN-to-PIN messaging or other PIN-to-PIN communication is to be used only for a current communication, then such a communication may occur in an operation 332. By contrast, if it is determined that PIN-to-PIN communication should be enabled for a longer period of time, PIN-to-PIN communication may be initiated manually by a user in an operation 336.

Other embodiments, uses and advantages of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. The specification should be considered exemplary only, and the scope of the invention is accordingly intended to be limited only by the following claims. 

1. A method for communicating between a remote wireless device and one or more back-end devices on a computer network using wireless PIN-to-PIN messages, comprising: cradling one or more wireless gateway devices to the computer network, wherein cradling the one or more wireless gateway devices to the computer network facilitates communication with the back-end devices on the computer network in a manner that bypasses one or more gateway devices on the computer network that are unavailable; determining a unique PIN identifier for the remote wireless device and one or more unique PIN identifiers for the one or more cradled wireless gateway devices, wherein the remote wireless device uses the unique PIN identifiers for the cradled wireless gateway devices and the cradled wireless gateway devices use the unique PIN identifier for the remote wireless device to communicate over a wireless data network using PIN-to-PIN messages in a manner that bypasses the unavailable gateway devices on the computer network; sending the one or more unique PIN identifiers for the one or more cradled wireless gateway devices to the remote wireless device over the wireless data network; and communicating information between the back-end devices on the computer network and the remote wireless device over the wireless data network, wherein communicating the information over the wireless data network includes: sending a first PIN-to-PIN message from at least one of the cradled wireless gateway devices to the remote wireless device over the wireless data network, wherein the at least one cradled wireless gateway device uses the unique PIN identifier for the remote wireless device to send the first PIN-to-PIN message to the remote wireless device over the wireless data network; and receiving, at the at least one cradled wireless gateway device, a second PIN-to-PIN message from the remote wireless device over the wireless data network, wherein the remote wireless device uses the unique PIN identifier for the at least one cradled wireless gateway device to send the at least one second PIN-to-PIN message to the at least one cradled wireless gateway device over the wireless data network.
 2. A system for communicating between a remote wireless device and one or more back-end devices on a computer network using wireless PIN-to-PIN messages, comprising: the remote wireless device, wherein the remote wireless device has a first unique PIN identifier for communicating over a wireless data network using PIN-to-PIN messages in a manner that bypasses one or more unavailable gateway devices on the computer network; and a wireless gateway device cradled to the computer network, wherein cradling the wireless gateway device to the computer network facilitates communication with the back-end devices on the computer network in a manner that bypasses the unavailable gateway devices on the computer network, and wherein the wireless gateway device has a second unique PIN identifier for communicating over the wireless data network using PIN-to-PIN messages in a manner that bypasses the unavailable gateway devices on the computer network, wherein the cradled wireless gateway device is configured to: send the unique PIN identifier for the cradled wireless gateway device to the remote wireless device over the wireless data network; send a first PIN-to-PIN message to the remote wireless device over the wireless data network, wherein the cradled wireless gateway device uses the unique PIN identifier for the remote wireless device to send the first PIN-to-PIN message to the remote wireless device over the wireless data network; and receive a second PIN-to-PIN message from the remote wireless device over the wireless data network, wherein the remote wireless device uses the unique PIN identifier for the cradled wireless gateway device to send the second PIN-to-PIN message to the cradled wireless gateway device over the wireless data network, wherein the first PIN-to-PIN message and the second PIN-to-PIN message communicate information between the back-end devices on the computer network and the remote wireless device over the wireless data network.
 3. A method for providing a remote wireless device access to one or more back-end devices on a computer network over a wireless data network, comprising: receiving, at the remote wireless device, one or more unique PIN addresses for one or more wireless gateway devices physically connected to the computer network, wherein the one or more wireless gateway devices physically connected to the computer network facilitate communication with the back-end devices on the computer network in a manner that bypasses one or more gateway devices on the computer network that are unavailable, and wherein the one or more unique PIN addresses uniquely identify the one or more wireless gateway devices on the wireless data network; sending a first PIN-to-PIN message to at least one of the wireless gateway devices over the wireless data network, wherein the remote wireless device uses the unique PIN address for the at least one wireless gateway device to send the first PIN-to-PIN message to the at least one wireless gateway device over the wireless data network; and receiving, at the remote wireless device, a second PIN-to-PIN message from the at least one wireless gateway device over the wireless data network, wherein the wireless gateway device uses a unique PIN address that uniquely identifies the remote wireless device on the wireless data network to send the second PIN-to-PIN message to the remote wireless device over the wireless data network, and wherein the first PIN-to-PIN message and the second PIN-to-PIN message communicate information between the back-end devices on the computer network and the remote wireless device over the wireless data network.
 4. The method of claim 3, wherein the one or more wireless gateway devices communicate their one or more unique PIN addresses to the unique PIN address for the remote wireless device in response to one or more predetermined events occurring, thereby enabling the communication of the information between the remote wireless device and the back-end devices on the computer network over the wireless data network.
 5. The method of claim 4, wherein the predetermined events include at least one of an emergency or disaster scenario.
 6. The method of claim 4, wherein the one or more wireless gateway devices include a plurality of redundant wireless gateway devices, and the remote wireless device sends the first PIN-to-PIN message to more than one of the redundant wireless gateway devices.
 7. The method of claim 6, wherein the back-end devices on the computer network include one or more wireless servers connected to the redundant wireless gateway devices, and wherein at least one of the redundant wireless gateway devices provides the remote wireless device access to information on the computer network through at least one of the wireless servers.
 8. The method of claim 7, wherein the one or more wireless servers include a plurality of redundant wireless servers connected to the computer network in different locations.
 9. The method of claim 8, wherein one or more of the redundant wireless gateway devices or the redundant wireless servers are served on different wireless data networks to provide further redundancy.
 10. The method of claim 7, wherein the remote wireless device can access the information on the computer network through one or more of the redundant wireless servers or one or more devices connected to the redundant wireless servers.
 11. The method of claim 10, further comprising receiving, at the remote wireless device, a notification that indicates an availability for the redundant wireless gateway devices.
 12. The method of claim 6, wherein a user selects one of the redundant wireless gateway devices with which the remote wireless device communicates.
 13. The method of claim 6, wherein the remote wireless device automatically selects one of the redundant wireless gateway devices with which the remote wireless device communicates.
 14. The method of claim 13, wherein the remote wireless device automatically selects the wireless gateway device with which to communicate based on at least one of a type of the wireless gateway devices or the availability of the wireless gateway devices.
 15. The method of claim 3, wherein the remote wireless device can access data resources associated with the back-end devices on the computer network via the first PIN-to-PIN message sent to the at least one wireless gateway devices and the second PIN-to-PIN message received from the at least one wireless gateway device.
 16. The method of claim 3, wherein the wireless gateway devices act as nodes on the computer network when physically connected to the computer network, and wherein the remote wireless device can send and receive PIN-to-PIN messages to and from the wireless gateway devices to access data resources associated with the back-end devices on the computer network.
 17. The method of claim 16, wherein the wireless gateway devices further act as nodes on the wireless data network and communicate with one or more resources physically connected to the computer network to access the data resources associated with the back-end devices on the computer network.
 18. The method of claim 17, wherein the wireless gateway devices provide a direct link from the remote wireless device to network equipment attached to the computer network, wherein the direct link bypasses the unavailable gateway devices between the remote wireless device and the back-end devices on the computer network.
 19. The method of claim 18, wherein the remote wireless device can access the data resources associated with the back-end devices on the computer network in either a PIN-to-PIN messaging mode or a normal mode, wherein the remote wireless device communicates with the wireless gateway devices over the wireless data network to access the data resources associated with the back-end devices on the computer network in the PIN-to-PIN messaging mode, and wherein the remote wireless devices communicates with the gateway devices over the computer network to access the data resources associated with the back-end devices on the computer network in the normal mode.
 20. The method of claim 19, wherein a user manually switches the remote wireless device to the PIN-to-PIN messaging mode in response to receiving a PIN-to-PIN message that notifies the user to initiate PIN-to-PIN messaging.
 21. The method of claim 20, wherein the wireless gateway device sends the PIN-to-PIN message that notifies the user to initiate PIN-to-PIN messaging on the remote wireless device in response to determining that the one or more gateway devices between the remote wireless device and the back-end devices on the computer network are unavailable.
 22. The method of claim 3, wherein the remote wireless device automatically switches to a PIN-to-PIN messaging mode in response to receiving a PIN-to-PIN message that includes the unique PIN addresses for the wireless gateway devices.
 23. The method of claim 3, further comprising receiving, at the remote wireless device, an update to the unique PIN addresses for one or more of the wireless gateway devices.
 24. The method of claim 3, further comprising: sending, by the remote wireless device, a request to one or more of the wireless gateway devices to retrieve one or more unique PIN addresses for one or more other remote wireless devices associated with the computer network; receiving, at the remote wireless device, the one or more requested unique PIN addresses; and sending a third PIN-to-PIN message to at least one of the other remote wireless devices over the wireless data network, wherein the remote wireless device uses the unique PIN address for the at least one other remote wireless device to send the third PIN-to-PIN message to the at least one other remote wireless device over the wireless data network.
 25. The method of claim 24, wherein the remote wireless device has access to information relating to the one or more unique PIN addresses requested for the one or more other remote wireless devices dependent upon at least one of network access rights or a security protocol.
 26. The method of claim 24, wherein the remote wireless device has access to information relating to the one or more unique PIN addresses requested for the one or more other remote wireless devices dependent upon a configuration of a wireless server connected to the wireless gateway device.
 27. The method of claim 24, wherein the request identifies one or more entries in an address book of the remote wireless device.
 28. The method of claim 27, wherein the request includes one or more of a partial name, initials, or other information for the entries in the address book.
 29. The method of claim 24, wherein the request identifies every user associated with the computer network.
 30. The method of claim 24, further comprising sending a plurality of PIN-to-PIN messages to a plurality of the other remote wireless devices associated with one or more groups of users associated with the computer network, wherein the remote wireless device uses the unique PIN addresses for the plurality of other remote wireless devices to send the plurality of PIN-to-PIN messages to the plurality of other remote wireless devices over the wireless data network.
 31. The method of claim 30, wherein the groups of users include one or more of addresses in a group that an administrator of the computer network has defined, addresses in a group defined on the remote wireless device, or addresses in a group that a user has defined manually.
 32. The method of claim 30, further comprising establishing a conference call through a voice gateway communicatively coupled to the wireless gateway device, wherein the instant conference call includes the remote wireless device and voice-enabled remote wireless devices associated with at least one of the groups of users.
 33. A method for communicating between a remote wireless device and one or more back-end devices on a computer network over a wireless data network to bypass one or more gateway devices on the computer network that are unavailable, the method comprising: communicating, to the remote wireless device, a unique PIN address that uniquely identifies a wireless gateway device on the wireless data network, wherein the wireless gateway device has a physical connection to the computer network; receiving, at the wireless gateway device, a PIN-to-PIN message from the remote wireless device, wherein the remote wireless device uses the unique PIN address for the wireless gateway device to send the PIN-to-PIN message to the wireless gateway device over the wireless data network; and communicating, by the wireless gateway device, information retrieved from the one or more back-end devices on the computer network to a unique PIN address that uniquely identifies the remote wireless device on the wireless data network, whereby the wireless gateway device facilitates communication between the remote wireless device and the one or more back-end devices on the computer network over the wireless data network in a manner that bypasses the unavailable gateway devices on the computer network. 