System and method for configuring access to electronic mailboxes
First Claim
Patent Images
1. A system comprising:
- a memory configured to store configuration conventions relating to sets of configuration parameters for accessing electronic mailboxes; and
a processor configured to cooperate with said memory toreceive limited configuration information that does not provide all necessary configuration parameters for accessing an electronic mailbox,infer a mailbox domain from the limited configuration information and determine configuration conventions for the mailbox domain that represent potentially valid configuration parameters for the mailbox domain,generate sets of potentially valid configuration parameters to attempt to access the electronic mailbox and based upon the limited configuration information and the retrieved configuration conventions, andgenerate a subset of the sets of the potentially valid configuration parameters based upon additional information when at least one attempt to access the electronic mailbox based upon one of the sets of potentially valid configuration parameters is unsuccessful, the additional information comprising a protocol used for accessing the electronic mailbox.
5 Assignments
0 Petitions
Accused Products
Abstract
A system and method for configuring access to an electronic mailbox based on limited configuration parameters received from a user. A database stores configuration conventions for a mail domain. A mailbox interface module receives configuration information from a user that is limited in the configuration parameters required for accessing the electronic mailbox. The module retrieves configuration conventions for the mail domain from the database and generates sets of potentially valid configuration parameters based on the retrieved configuration conventions and user supplied configuration information for accessing the mailbox.
-
Citations
25 Claims
-
1. A system comprising:
-
a memory configured to store configuration conventions relating to sets of configuration parameters for accessing electronic mailboxes; and a processor configured to cooperate with said memory to receive limited configuration information that does not provide all necessary configuration parameters for accessing an electronic mailbox, infer a mailbox domain from the limited configuration information and determine configuration conventions for the mailbox domain that represent potentially valid configuration parameters for the mailbox domain, generate sets of potentially valid configuration parameters to attempt to access the electronic mailbox and based upon the limited configuration information and the retrieved configuration conventions, and generate a subset of the sets of the potentially valid configuration parameters based upon additional information when at least one attempt to access the electronic mailbox based upon one of the sets of potentially valid configuration parameters is unsuccessful, the additional information comprising a protocol used for accessing the electronic mailbox. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a memory configured to store configuration conventions relating to sets of configuration parameters for accessing electronic mailboxes; and a processor configured to cooperate with said memory to receive limited configuration information that does not provide all necessary configuration parameters for accessing an electronic mailbox, infer a mailbox domain from the limited configuration information, generate sets of potentially valid configuration parameters based upon the inferred mailbox domain and the limited configuration information, and generate a subset of the sets of the potentially valid configuration parameters based upon additional information when at least one attempt to access the electronic mailbox based upon one of the sets of potentially valid configuration parameters is unsuccessful, the additional information comprising a protocol used for accessing the electronic mailbox. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A configuration method comprising:
-
receiving limited configuration information that does not provide all necessary configuration parameters for accessing an electronic mailbox; inferring a mailbox domain from the limited configuration information; generating sets of potentially valid configuration parameters based upon the inferred mailbox domain and the limited configuration information; and generating a subset of the sets of the potentially valid configuration parameters based upon additional information when at least one attempt to access the electronic mailbox based upon one of the sets of potentially valid configuration parameters is unsuccessful, the additional information comprising a protocol used for accessing the electronic mailbox. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification