Method and apparatus for accessing corporate data from a mobile device
First Claim
1. A computer-implemented method performed by a buffer server, comprising:
- generating a device key and a buffer server key from a corporate server key, comprising;
extracting a first split password and a second split password from an encrypted version of the corporate server key;
encrypting the first split password with the second split password to produce the buffer server key; and
encrypting the second split password to produce the device key, wherein the device key is stored on a mobile device and the buffer server key is stored on the buffer server;
receiving, by the buffer server, a first communication request and the device key from the mobile device, wherein the buffer server comprises a processing unit and a storage device;
verifying the device key and the buffer server key, wherein the device key and the buffer server key are related;
sending, to a corporate server, a request with details associated with the device key and the buffer server key;
receiving a response from the corporate server;
removing, by the buffer server, less than all data from the response from the corporate server before forwarding a reduced response to the mobile device, wherein the reduced response comprises only predetermined fields in accordance with a corporate policy;
receiving a user identification and a second communication request, from the mobile device, for the data that has been removed; and
sending, upon verifying the user identification, the data that has been removed to the mobile device.
13 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented communication method performed by a computerized device and a computerized communication apparatus, the method comprising: receiving by a buffer server a first communication request and a device key from a mobile device; verifying the device key and a buffer server key; sending a request with details associated with the device key and the buffer server key, to a corporate server; receiving a response from the corporate server; removing data from the response, and sending a reduced response to the mobile device; receiving a user identification and a second communication request from the mobile device, for the data that has been removed; and sending the data that has been removed to the mobile device, upon verifying the user identification.
26 Citations
27 Claims
-
1. A computer-implemented method performed by a buffer server, comprising:
-
generating a device key and a buffer server key from a corporate server key, comprising; extracting a first split password and a second split password from an encrypted version of the corporate server key; encrypting the first split password with the second split password to produce the buffer server key; and encrypting the second split password to produce the device key, wherein the device key is stored on a mobile device and the buffer server key is stored on the buffer server; receiving, by the buffer server, a first communication request and the device key from the mobile device, wherein the buffer server comprises a processing unit and a storage device; verifying the device key and the buffer server key, wherein the device key and the buffer server key are related; sending, to a corporate server, a request with details associated with the device key and the buffer server key; receiving a response from the corporate server; removing, by the buffer server, less than all data from the response from the corporate server before forwarding a reduced response to the mobile device, wherein the reduced response comprises only predetermined fields in accordance with a corporate policy; receiving a user identification and a second communication request, from the mobile device, for the data that has been removed; and sending, upon verifying the user identification, the data that has been removed to the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 27)
-
-
17. A system having a buffer server with a processing unit and a storage device, the buffer server comprising:
-
a mobile device communication component that communicates with a mobile device; a server communication component that communicates with a server; a password generation and manipulation component that generates a mobile device password and a buffer server password from a corporate server password, wherein the password generation and manipulation component; extracts a first split password and a second split password from an encrypted version of the corporate server password; encrypts the first split password with the second split password to produce the buffer server password; and encrypts the second split password to produce the mobile device password, wherein the mobile device password is stored on the mobile device and the buffer server password is stored on the buffer server; wherein the password generation and manipulation component also receives the mobile device password to be used in conjunction with the buffer server password to authenticate the mobile device, and wherein the password generation and manipulation component also receives a user characteristic from the mobile device communicating with the buffer server and verifies a user of the mobile device, wherein the mobile device password and the buffer server password are related; and a message processing component that processes for processing requests from the mobile device before transferring to the server, and removes, less than all data from a response from the server before transferring a reduced response to the mobile device, wherein the reduced response comprises only predetermined fields in accordance with a corporate policy, wherein the reduced response is provided to the mobile device upon authentication of the mobile device, and wherein the removed data is provided to the mobile device responsive to the user of the mobile device being verified. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A non-transitory computer readable medium having executable instructions thereon, the executable instructions comprising:
-
a first program instruction for generating a device key and a buffer server key from a corporate server key, comprising; extracting a first split password and a second split password from an encrypted version of the corporate server key; encrypting the first split password with the second split password to produce the buffer server key; and encrypting the second split password to produce the device key, wherein the device key is stored on a mobile device and the buffer server key is stored on a buffer server; a second program instruction for receiving, by the buffer server, a first communication request and the device key from the mobile device; a third program instruction for verifying the device key and the buffer server key, wherein the device key and the buffer server key are related; a fourth program instruction for sending, to a corporate server, a request with details associated with the device key and the buffer server key; a fifth program instruction for receiving a response from the corporate server; a sixth program instruction for removing, by the buffer server, less than all data from the response from the corporate server before forwarding a reduced response to the mobile device, wherein the reduced response comprises only predetermined fields in accordance with a corporate policy; a seventh program instruction for receiving a user identification and a second communication request, from the mobile device, for the data that has been removed; and an eighth program instruction for sending, upon verifying the user identification, the data that has been removed to the mobile device.
-
Specification