System for using email message to transmit a command to remotely control a computer resource
원문보기
IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0967202
(2007-12-30)
|
등록번호 |
US-7711785
(2010-06-03)
|
발명자
/ 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
0 인용 특허 :
8 |
초록
▼
A Trojan horse method and apparatus to permit email access to secure enterprise resources within an enterprise's firewall. An email message is used to permit a user to gain access to computer resources such as databases maintained within a secure enterprise's firewall. An email message generated fro
A Trojan horse method and apparatus to permit email access to secure enterprise resources within an enterprise's firewall. An email message is used to permit a user to gain access to computer resources such as databases maintained within a secure enterprise's firewall. An email message generated from a palmtop computer or any other computer capable of sending and receiving email messages is used to pass through the firewall as a conventional email message would. The email message is received at a designated computer that recognizes reserved command words as a part of the email message, preferably as a part of the subject line thereof. Upon recognizing the reserved command word, the email message is parsed to determine key components of a command that can be executed on a desired enterprise computer resource. An appropriate command (e.g., an SQL query) is then created for execution on the enterprise computer resource (e.g., a database). A response or acknowledgement is then returned to the sender as an email message.
대표청구항
▼
What is claimed is: 1. A method of using an email message to control a computer resource comprising: composing an email message having a subject line and a body, the subject line including a reserved command word, and the body including command information for enabling a command to be executed on t
What is claimed is: 1. A method of using an email message to control a computer resource comprising: composing an email message having a subject line and a body, the subject line including a reserved command word, and the body including command information for enabling a command to be executed on the computer resource; and sending the email message to a computer having direct access to the computer resource; inspecting the email message for an email source address to determine if a sender of the email message is authorized to control the computer resource; using the computer having direct access to the computer resource to recognize the reserved command word and the command information, to parse the command word into an executable command to control the computer resource accordingly; and receiving results of execution of the command from the computer having direct access to the computer resource. 2. The method of claim 1, wherein the computer having direct access to the computer resource is protected by a firewall. 3. The method of claim 2, wherein the email message is sent over the Internet. 4. The method of claim 1, further comprising: encrypting the email message so as to ensure the email message is selectively interpretable only by the computer having direct access to the computer resource. 5. The method of claim 1, wherein the command information includes one or more discrete portions. 6. The method of claim 1, wherein the command comprises a request to retrieve information from a record in the computer database and the one or more discrete portions of the command information includes data identifying the record to be accessed and a field type of the information to be retrieved from the record. 7. The method of claim 1, wherein the command comprises a request to add a record in the computer database and the one or more discrete portions of the command information includes data related to the record to be added. 8. The method of claim 1, wherein the command comprises a request to delete a record in the computer database and the one or more discrete portions of the command information includes data identifying the record to be deleted. 9. The method of claim 1, wherein the command comprises a request to modify a record in the computer database and the one or more discrete portions of the command information includes data identifying the record to be modified and a field type of information to be modified in the record. 10. The method of claim 1, wherein the results are received in the form of a return email. 11. The method of claim 1, further comprising providing a user interface separate from the email message for allowing a user to input data used to construct the database query. 12. The method of claim 11, wherein the user interface includes at least one of a form and a pull-down menu. 13. A method of providing access to a resource residing on a computer protected by a firewall comprising: receiving an email message having a subject line and a body from a sender; determining whether access to the resource is enabled based on whether the subject line of the email message includes a predetermined reserved command word; when access is enabled, parsing the email message to provide a resource command; and executing the resource command for performing an operation on the resource based on information in the body of the email message; wherein the body of the email message includes command information for performing an operation on the resource, the command information including a command type; wherein the resource comprises a database and the command type is selected from the group comprising: retrieve, add, delete and modify; and after executing the command, responding to the sender with a return email message including results of execution of the command. 14. The method of claim 13, wherein the sender comprises a portable computer. 15. The method of claim 13, wherein the body of the email message further includes password information associated with the sender. 16. The method of claim 15, further comprising: determining whether the sender is a trusted source based on the password information in the body of the email message. 17. The method of claim 16, wherein the email message is encrypted. 18. The method of claim 13, wherein the command information further includes data identifying a record in the database to which the command pertains. 19. The method of claim 18, further comprising: parsing the body of the email message to obtain the data identifying the record in the database to which the command pertains. 20. The method of claim 13, wherein the body of the email message further includes field type data including one or more data fields. 21. The method of claim 20, wherein the body of the email message further includes new entry data associated with the one or more data fields. 22. The method of claim 21, further comprising: parsing the body of the email message to obtain the data identifying the record in the database to which the command pertains, field type data and new entry data; and modifying the identified database record based on the field type data and the new entry data. 23. The method of claim 22, further comprising: responding to the sender with a return email message including an error indication if there is an error in performing the parsing.
이 특허에 인용된 특허 (8)
-
Mark M. Gottlieb, E-mail notification device.
-
Frantz Robert H., E-mail system and interface for equipment monitoring and control.
-
Ono, Hiroshi, Homepage information production system.
-
Nielsen Jakob, Method and apparatus for managing subscriptions to distribution lists.
-
L'Heureux, David; Hackerd, Craig, Method for remotely managing a remote device using an electronic mail message.
-
Shinichi Hirata JP, Reception method, reception device, transmission method, transmission device, transmission/reception method, transmission/reception device.
-
Donnie Henderson, System and method for creation and conversion of electronic mail messages for delivery to telephone recipients.
-
Davis Jason O'Neal ; Gold Brian Keith, Systems, methods and computer program products for updating hypertext documents via electronic mail.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.