IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0060525
(2002-01-29)
|
발명자
/ 주소 |
- Tock,Theron
- Srinivas,Sampath
- Sang,Yvonne Pui Fung
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
17 인용 특허 :
21 |
초록
▼
Improved approaches for providing secure remote access to email resources maintained on private networks are disclosed. The secure access can be provided through a public network using a standard network browser. Multiple remote users are able to gain restricted and controlled access to email on a m
Improved approaches for providing secure remote access to email resources maintained on private networks are disclosed. The secure access can be provided through a public network using a standard network browser. Multiple remote users are able to gain restricted and controlled access to email on a mail server within a private network through a common access point. The solution provided by the improved approaches allow not only native access to email resources but also robust authentication approaches.
대표청구항
▼
What is claimed is: 1. A method for facilitating remote access by a mail client to a mail server via an intermediary server, said method comprising: (a) receiving a mail access request at the intermediary server, the mail access request being sent to the intermediary server from the mail client for
What is claimed is: 1. A method for facilitating remote access by a mail client to a mail server via an intermediary server, said method comprising: (a) receiving a mail access request at the intermediary server, the mail access request being sent to the intermediary server from the mail client for a requestor; (b) receiving a password associated with the mail access request; (c) authenticating the requestor with the mail server based on the received password; (d1) retrieving a previously stored hashed password associated with the requestor or the mail client; (d2) determining whether a hashed version of the received password matches the retrieved hashed password; (d3) authenticating, based on the received password, the requestor with an authentication server that couples to a private network that includes the mail server; and (d4) bypassing said authenticating (d3) and deeming the received password authenticated when said determining (d2) determines that the hashed version of the received password matches the retrieved hashed password. 2. A method as recited in claim 1, wherein said retrieving (d1) further includes at least retrieving a time last used password, and wherein said method further comprises: (d5) determining whether the time last used password exceeds a predetermined duration; and (d6) preventing said bypassing (d4) from bypassing said authenticating (d3) when said determining (d5) determines that the time last used password exceeds the predetermined duration. 3. A method as recited in claim 2, wherein the predetermined duration is a maximum idle duration. 4. A method as recited in claim 3, wherein a mail server password and an authentication server password are included in or derived from the received password, wherein said authenticating (c) authenticates the requestor with the mail server using the mail server password, and wherein said authenticating (d3) authenticates the requestor with the authentication server using the authentication server password. 5. A method as recited in claim 1, wherein said retrieving (d1) further includes at least retrieving a time last authorized by the authentication server, and wherein said method further comprises: (d5) determining whether the time last authorized by the authentication server exceeds a predetermined duration; and (d6) preventing said bypassing (d4) from bypassing said authenticating (d3) when said determining (d5) determines that the time last authorized by the authentication server exceeds the predetermined duration. 6. A method as recited in claim 5, wherein the predetermined duration is a maximum session duration. 7. A method as recited in claim 5, wherein a mail server password and an authentication server password are included in or derived from the received password, wherein said authenticating (c) authenticates the requestor with the mail server using the mail server password, and wherein said authenticating (d3) authenticates the requestor with the authentication server using the authentication server password. 8. A method as recited in claim 1, wherein a mail server password and an authentication server password are included in or derived from the received password, wherein said authenticating (c) authenticates the requestor with the mail server using the mail server password, and wherein said authenticating (d3) authenticates the requestor with the authentication server using the authentication server password. 9. A method as recited in claim 1, wherein a mail server password and an authentication server password are separated by a password separator in the received password, wherein said authenticating (c) authenticates the requestor with the mail server using the mail server password, and wherein said authenticating (d3) authenticates the requestor with the authentication server using the authentication server password. 10. A method for authenticating a requestor of a remote mail client seeking access to a mail server, said method comprising: (a) receiving a password from the remote mail client; (b) retrieving a previously stored hashed password; (c) determining whether a hashed version of the received password matches the previously stored hashed password; (d) authenticating the requestor with the mail server based on the received password; and (e) further authenticating the requestor with an authentication server based on the received password when said determining (c) determines that the hashed version of the received password does not match the previously stored hashed password, the authentication server couples to or resides on a private network that includes the mail server. 11. A method as recited in claim 10, wherein said receiving (a) further receives a time last authorized by the authentication server and a time last used password, wherein said determining (c) further determines whether a time since the time last authorized by the authentication server exceeds a first predetermined duration and whether the time since the time last used password exceeds a second predetermined duration, and wherein said authenticating (e) is performed when said determining (c) determines that the time since the time last authorized by the authentication server exceeds the first predetermined duration or that the time since the time last used password exceeds the second predetermined duration, regardless of whether said determining (c) determines that the hashed version of the received password matches the previously stored hashed password. 12. A method as recited in claim 11, wherein the received password is an authentication password, and wherein the authentication password serves to authenticate the requestor or the remote mail client to the authentication server. 13. A method as recited in claim 11, wherein the first predetermined duration is a maximum session duration, and wherein the second predetermined duration is a maximum idle duration. 14. A method as recited in claim 10, wherein the received password is an authentication password, and wherein the authentication password serves to authenticate the requestor or the remote mail client to the authentication server. 15. A method as recited in claim 10, wherein said receiving (a) further receives a time last authorized by the authentication server, wherein said determining (c) further determines whether a time since the time last authorized by the authentication server exceeds a predetermined duration, and wherein said authenticating (e) is performed when said determining (c) determines that the time since the time last authorized by the authentication server exceeds the predetermined duration, regardless of whether said determining (c) determines that the hashed version of the received password matches the previously stored hashed password. 16. A method as recited in claim 10, wherein said receiving (a) further receives a time last used password, wherein said determining (c) further determines whether a time since the time last used password exceeds a predetermined duration, and wherein said authenticating (e) is performed when said determining (c) determines that the time since the time last used password exceeds the predetermined duration, regardless of whether said determining (c) determines that the hashed version of the received password matches the previously stored hashed password. 17. A computer readable storage medium including at least computer program code for authenticating a requestor of a remote mail client seeking access to a mail server, said computer readable storage medium comprising: computer program code for receiving a password from the remote mail client; computer program code for retrieving a previously stored hashed password; computer program code for determining whether a hashed version of the received password matches the previously stored hashed password; computer program code for authenticating the requestor with the mail server based on the received password; and computer program code for authenticating the requestor with an authentication server based on the received password when said computer program code for determining determines that the hashed version of the received password does not match the previously stored hashed password, the authentication server on a private network that includes the mail server. 18. A computer readable storage medium as recited in claim 17, wherein the received password is an authentication password, and wherein the authentication password serves to authenticate the requestor or the remote mail client to the authentication server. 19. A computer readable storage medium as recited in claim 17, wherein said computer program code for receiving further receives a time last authorized by the authentication server, wherein said computer program code for determining further determines whether a time since the time last authorized by the authentication server exceeds a predetermined duration, and wherein the authenticating is performed by said computer program code for authenticating when said computer program code for determining determines that the time since the time last authorized by the authentication server exceeds the predetermined duration, regardless of whether said computer program code for determining determines that the hashed version of the received password matches the previously stored hashed password. 20. A computer readable storage medium including at least computer program code for facilitating remote access by a mail client to a mail server via an intermediary server, said computer readable storage medium comprising: computer program code for receiving a mail access request at the intermediary server, the mail access request being sent to the intermediary server from the mail client for a requestor; computer program code for receiving a password associated with the mail access request; computer program code for authenticating the requestor with the mail server based on the received password; computer program code for retrieving a previously stored hashed password associated with the requestor or the mail client and determining whether the retrieved hashed password matches a hashed version of the received password; computer program code for authenticating the requestor with an authentication server based on the received password, the authentication server being coupled to or included in a private network that includes the mail server; and computer program code for bypassing the authenticating with the authentication server and deeming the received password as authenticated when the hashed version of the received password matches the retrieved hashed password. 21. A computer readable storage medium as recited in claim 20, wherein a mail server password and an authentication server password are included in or derived from the received password, wherein said computer program code for authenticating operates to authenticate the requestor with the mail server using the mail server password, and wherein said computer program code for authenticating operates to authenticate the requestor with the authentication server using the authentication server password.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.