Enhanced security for voice mail passwords
A voice mail and password technology, applied in the direction of safety communication devices, electrical components, monitoring/monitoring/test arrangements, etc., can solve problems not mentioned
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] figure 1 is a schematic diagram of an exemplary communication system in which wireless communication device 100 may be used in accordance with the present invention. Those skilled in the art will appreciate that there are hundreds of different system topologies. There can also be many message senders and receivers. figure 1 The simple exemplary system shown is illustrative only and represents perhaps the most prevalent Internet mail environment today.
[0027] figure 1 A mailer 10, Internet 12, message server system 14, wireless gateway 16, wireless infrastructure 18, wireless network 20, and mobile communication device 100 are shown.
[0028] For example, mailer 10 may be connected to an Internet Service Provider (ISP) located within the company, possibly connected to a local area network (LAN), connected to the Internet 12, and has a system user account on it, or may be connected through a system such as America Online TM (AOL)'s Big Application Service Provider (...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 