System using email message to transmit a command to remotely control a computer resource
First Claim
1. A method of using an email message to control a computer resource, comprising:
- receiving an email message from a sender that originates at a portable computer;
recognizing a reserved command word within the email message;
determining whether a plurality of separate parts of the email message include a respective plurality of identifiable portions of a command to be carried out on an available computer resource based on the reserved command word wherein the reserved command word comprises a part of a subject portion of the email message; and
assembling a command for execution on the computer resource using the plurality of identifiable portions of the command in the plurality of separate parts of the email message.
5 Assignments
0 Petitions
Accused Products
Abstract
A Trojan horse method and apparatus to permit email access to secure enterprise resources within an enterprise'"'"'s firewall. An email message is used to permit a user to gain access to computer resources such as databases maintained within a secure enterprise'"'"'s firewall. An email message generated from a palmtop computer or any other computer capable of sending and receiving email messages is used to pass through the firewall as a conventional email message would. The email message is received at a designated computer that recognizes reserved command words as a part of the email message, preferably as a part of the subject line thereof. Upon recognizing the reserved command word, the email message is parsed to determine key components of a command that can be executed on a desired enterprise computer resource. An appropriate command (e.g., an SQL query) is then created for execution on the enterprise computer resource (e.g., a database). A response or acknowledgement is then returned to the sender as an email message.
-
Citations
21 Claims
-
1. A method of using an email message to control a computer resource, comprising:
-
receiving an email message from a sender that originates at a portable computer; recognizing a reserved command word within the email message; determining whether a plurality of separate parts of the email message include a respective plurality of identifiable portions of a command to be carried out on an available computer resource based on the reserved command word wherein the reserved command word comprises a part of a subject portion of the email message; and assembling a command for execution on the computer resource using the plurality of identifiable portions of the command in the plurality of separate parts of the email message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of using an email message to control a computer resource, comprising:
-
receiving an email message from a sender, the email message originating at a palmtop computer; recognizing a reserved word within a subject portion of the email message wherein the reserved command word comprises a part of a subject portion of the email message; interpreting the email message as a command based on the reserved word to be carried out on an available computer resource comprising a computer database; determining whether a plurality of separate parts of the email message include a respective plurality of identifiable portions that define the computer resource and the command; assembling the plurality of identifiable portions in the plurality of separate parts of the email message as a database query for execution on the computer database; receiving a result from the available computer database; and sending a reply email message communicating the result to the sender. - View Dependent Claims (12)
-
-
13. A system that uses an email message to control a computer resource from a remote location, comprising:
-
a first programmed processor having an email program that receives an email message from a sender; a program operating on the first programmed processor that; recognizes a reserved command word within the email message wherein the reserved command word comprises a part of a subject portion of the email message; determines whether a plurality of separate parts of the email message include a respective plurality of identifiable portions of a command to be carried out on an available computer resource based on the reserved command word; and assembles a command for execution on the available computer resource using the plurality of identifiable portions of the command in the plurality of separate parts of the email message. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
Specification