Method and system for using email messages to remotely control a computer resource
1 Assignment
0 Petitions
Accused Products
Abstract
A Trojan horse method and apparatus to permit email access to secure enterprise resources within an enterprise'"'"'s firewall. An email message is used to permit a user to gain access to computer resources such as databases maintained within a secure enterprise'"'"'s firewall. An email message generated from a palmtop computer or any other computer capable of sending and receiving email messages is used to pass through the firewall as a conventional email message would. The email message is received at a designated computer that recognizes reserved command words as a part of the email message, preferably as a part of the subject line thereof. Upon recognizing the reserved command word, the email message is parsed to determine key components of a command that can be executed on a desired enterprise computer resource. An appropriate command (e.g., an SQL query) is then created for execution on the enterprise computer resource (e.g., a database). A response or acknowledgement is then returned to the sender as an email message.
-
Citations
30 Claims
-
1. (canceled)
-
2. A method of using an email message to control a computer resource comprising:
-
composing an email message having a subject line and a body, the subject line including a reserved command word, and the body including command information for enabling a command to be executed on the computer resource; and sending the email to a computer having direct access to the computer resource; wherein the reserved command word and the command information are recognizable by the computer having direct access to the computer resource. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of providing access to a resource residing on a computer protected by a firewall comprising:
-
receiving an email message having a subject line and a body from a sender; determining whether access to the resource is requested based on whether the subject line of the email message includes a reserved command word; and executing a command for performing an operation on the resource based on information in the body of the email message. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification