Method and Apparatus for Accessing Corporate Data from a Mobile Device
First Claim
1. A computer-implemented method performed by a computerized device, comprising:
- receiving by a buffer server a first communication request and a device key from a mobile device;
verifying the device key and a buffer server key;
sending a request with details associated with the device key and the buffer server key, to a corporate server;
receiving a response from the corporate server;
removing data from the response, and sending a reduced response to the mobile device;
receiving a user identification and a second communication request from the mobile device, for the data that has been removed; and
sending the data that has been removed to the mobile device, upon verifying the user identification.
13 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented communication method performed by a computerized device and a computerized communication apparatus, the method comprising: receiving by a buffer server a first communication request and a device key from a mobile device; verifying the device key and a buffer server key; sending a request with details associated with the device key and the buffer server key, to a corporate server; receiving a response from the corporate server; removing data from the response, and sending a reduced response to the mobile device; receiving a user identification and a second communication request from the mobile device, for the data that has been removed; and sending the data that has been removed to the mobile device, upon verifying the user identification.
125 Citations
37 Claims
-
1. A computer-implemented method performed by a computerized device, comprising:
-
receiving by a buffer server a first communication request and a device key from a mobile device; verifying the device key and a buffer server key; sending a request with details associated with the device key and the buffer server key, to a corporate server; receiving a response from the corporate server; removing data from the response, and sending a reduced response to the mobile device; receiving a user identification and a second communication request from the mobile device, for the data that has been removed; and sending the data that has been removed to the mobile device, upon verifying the user identification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus having a processing unit and a storage device, the apparatus comprising a buffer server, the buffer server comprising:
-
a mobile device communication component for communicating with a mobile device; a server communication component for communicating with a server; a password manipulation component for receiving a mobile device password to be used in conjunction with a buffer server password to authenticate the device, and for receiving a user characteristic from a mobile device communicating with the buffer server, and verifying a user using the mobile device; and a message processing component for processing requests from the mobile device before transferring to the server, and processing responses from the server before transferring to the mobile device, wherein reduced response is provided to the mobile device upon authentication of the device, and the removed data is provided to the device responsive to user identification. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A mobile communication device adapted to communicate with a corporate server, the mobile device comprising:
-
an application for displaying in a unified list data received from the corporate server and data received from a second server at the same time, wherein data received from the corporate server is displayed only after further identification of the mobile device or a user of the mobile device. - View Dependent Claims (30, 31, 32)
-
-
33. A mobile communication device adapted to communicate with a corporate server, the mobile device comprising:
-
an application for displaying in a secure manner data received from the corporate server, wherein data received from the corporate server is not stored in a non-transient memory unit of the mobile communication device.
-
-
34. A computer-implemented method performed by a computerized device, comprising:
-
notifying an e-mail user that a decoy e-mail will be sent; sending a decoy message to the e-mail user, the decoy message comprising a link; and raising an alert related to an illegitimate user or malware opening the decoy message, responsive to said link being accessed.
-
-
35. A computer-implemented method performed by a computerized device, comprising:
-
receiving a corporate server password C; encrypting C with a first private key to obtain X; extracting X1 and X2 from X; encrypting X1 with; and encrypting X2 with a second key, wherein X1 is stored on a mobile device, X2 is stored on a buffer server, such that the mobile device securely communicates with the corporate server through the buffer server.
-
-
36. A computer-implemented method performed by a computerized device, comprising:
-
receiving a corporate server password C; generating a password L; and encrypting C with L to obtain E, wherein L is stored on a mobile device, E is stored on a buffer server, such that the mobile device securely communicates with the corporate server through the buffer server.
-
-
37. A computer program product comprising:
-
a non-transitory computer readable medium; a first program instruction for receiving by a buffer server a first communication request and a device key from a mobile device; a second program instruction for verifying the device key and a buffer server key; a third program instruction for sending a request with details associated with the device key and the buffer server key, to a corporate server; a fourth program instruction for receiving a response from the corporate server; a fifth program instruction for removing data from the response, and sending a reduced response to the mobile device; a sixth program instruction for receiving a user identification and a second communication request from the mobile device, for the data that has been removed; and a seventh program instruction for sending the data that has been removed to the mobile device, upon verifying the user identification, wherein said first, second, third, fourth, fifth, sixth and seventh program instructions are stored on said non-transitory computer readable medium.
-
Specification