Remote command server
First Claim
1. A method for providing control of a first computing device from a second computing device, the method comprising the steps of:
- accessing an electronic message received by an electronic message application in the first computing device, wherein the electronic message is sent from the second computing device;
comparing an e-mail address of the received electronic message to an e-mail address database which contains at least one e-mail address, wherein each e-mail address in the e-mail address database has a corresponding access level indication to indicate which commands are allowed to be sent from the e-mail address to the first computing device;
extracting, in the case that the e-mail address of the received electronic message is included in the e-mail address database, a command from the received electronic message, selecting from a plurality of function calls at least one function call based on the extracted command and the corresponding access level, initiating execution of the at least one selected function call, obtaining output data from the executed function call, and composing an output electronic message for the executed function call, wherein the output electronic message is directed to a specific address and contains the output data from the executed function call;
composing, in the case that the e-mail address of the received electronic message is not included in the e-mail address database, an output electronic message which is directed to a specific address and which contains text indicating denial of access to control of the first computing device; and
sending each output electronic message via the electronic message application to the specific address.
1 Assignment
0 Petitions
Accused Products
Abstract
Providing control of a first computing device from a second computing device, including accessing an electronic message received by an electronic message application in the first computing device from the second computing device, extracting a command from the received electronic message, selecting from a plurality of function calls at least one function call corresponding to the extracted command, initiating execution of the at least one function call, obtaining output data from each executed function call, composing an output electronic message for each executed function call, the output electronic message being directed to a specific address and containing the output data from the executed function call, and sending each output electronic message via the electronic message application to the specific address.
-
Citations
35 Claims
-
1. A method for providing control of a first computing device from a second computing device, the method comprising the steps of:
-
accessing an electronic message received by an electronic message application in the first computing device, wherein the electronic message is sent from the second computing device; comparing an e-mail address of the received electronic message to an e-mail address database which contains at least one e-mail address, wherein each e-mail address in the e-mail address database has a corresponding access level indication to indicate which commands are allowed to be sent from the e-mail address to the first computing device; extracting, in the case that the e-mail address of the received electronic message is included in the e-mail address database, a command from the received electronic message, selecting from a plurality of function calls at least one function call based on the extracted command and the corresponding access level, initiating execution of the at least one selected function call, obtaining output data from the executed function call, and composing an output electronic message for the executed function call, wherein the output electronic message is directed to a specific address and contains the output data from the executed function call; composing, in the case that the e-mail address of the received electronic message is not included in the e-mail address database, an output electronic message which is directed to a specific address and which contains text indicating denial of access to control of the first computing device; and sending each output electronic message via the electronic message application to the specific address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification