WO2004030308A1 - Procede pour transferer des donnees, par ex. des courriers electroniques, entre un ordinateur, protege par un pare-feu, et un dispositif externe, par ex. un terminal mobile - Google Patents
Procede pour transferer des donnees, par ex. des courriers electroniques, entre un ordinateur, protege par un pare-feu, et un dispositif externe, par ex. un terminal mobile Download PDFInfo
- Publication number
- WO2004030308A1 WO2004030308A1 PCT/DK2002/000674 DK0200674W WO2004030308A1 WO 2004030308 A1 WO2004030308 A1 WO 2004030308A1 DK 0200674 W DK0200674 W DK 0200674W WO 2004030308 A1 WO2004030308 A1 WO 2004030308A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- firewall
- computer
- external device
- external
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/58—Message adaptation for wireless communication
Definitions
- the present invention relates to a method of providing secure access from mobile devices to corporate data, such as e-mails, residing behind a firewall.
- the method according to the first aspect secures:
- the secured connection through the firewall is established as a result of an automatically generated HTTP-request by a client application through the firewall from the firewall-protected computer to the external computer.
- the secured connection through the firewall is established through port 80 of the firewall.
- Data may be provided from the firewall-protected computer to the external computer in response to a command being received by the firewall- protected computer from the server application running on the external computer, the command being a result of the request from the external device to the external computer.
- the data provided from the firewall-protected computer to a external computer is encrypted data - for example by using SSL.
- the secured connection through the firewall is established via a network, such as the Internet.
- the firewall-protected computer may be a server or a personal computer.
- the external network may comprise a wireless network, such as a GSM network.
- the external device is capable of running a client application so that data, such as e-mails, delivered from the external computer to the external device may be delivered through a service based on the POP3 protocol, and wherein e-mails delivered from the external device to the external computer are delivered through a service based on the SMTP protocol.
- the external device may comprise a mobile device selected from the group consisting of: mobile phones, laptops, handheld devices, such as a PDAs, or any combination thereof.
- the external computer is adapted to run a server application for supporting a client application running on the external device.
- the external device is capable of running a browser.
- the external device may be selected from the group consisting of: mobile phones, computers, such as laptops, handheld devices, such as a PDAs, or any combination thereof.
- the external network comprises a wired network, such as the Internet.
- the external device is capable of running a client application.
- Data delivered from the external computer to the external device may be delivered through a service based on the POP3 protocol, and wherein e-mails delivered from the external device to the external computer are delivered through a service based on the SMTP protocol.
- the external device may comprise a computer selected from the group consisting of: personal computers, laptops, handheld devices, such as a PDAs, or any combination thereof.
- the data delivered to the external device in any of the above-mentioned embodiments comprises emails.
- the present invention relates to a method of distributing a mobile Internet service to an external device associated with a user, the method comprising the steps of:
- the external device comprises a mobile device selected from the group consisting of: mobile phones, laptops, handheld devices, such as a PDAs, or any combination thereof.
- a mobile device selected from the group consisting of: mobile phones, laptops, handheld devices, such as a PDAs, or any combination thereof.
- the userid may comprise the mobile telephone number of a mobile phone.
- the step of installing the client application on the firewall-protected computer is performed using a secured connection through the firewall between the firewall- protected computer and the external computer.
- figure 1 shows an overview of the overall system
- figure 2 illustrates the architecture of the system
- figure 3 illustrates the data transmission security
- the present invention provides a mobile Internet business solution that provides secure access from mobile devices to corporate data residing behind a firewall. Such corporate data may be e-mails.
- the solution according to the present invention requires no server installation and supports all standard POP3 e-mail clients and WAP clients on mobile devices. This is made possible through the unique technology of the present invention, which combines an e- mail service provided from a server on the Internet with a secure delivery method through a client application installed on a PC behind the firewall.
- MBC Mobile Business Connector
- the MBC Server retrieves e-mails from the firewall protected PC. E-mails are then delivered to the mobile device through a POP3 e-mail service.
- the mobile device connects to the MBC Server using a POP3 e-mail client and receives e-mails from the firewall protected PC running the MBC Desktop Client.
- the architecture of the technical solution is illustrated in figure 2. In the following sections, reference will be made to boxes A, B and C or figure 2.
- a - MBC Desktop Client the MBC Desktop Client is typically a Windows application that is installed on the PC behind the firewall.
- the application connects to Microsoft Outlook using a MAPI interface (Microsoft Application Developer Interface) and accesses e-mails from Outlook.
- MAPI interface Microsoft Application Developer Interface
- the MBC Desktop Client establishes a secure connection between the firewall protected PC and the MBC Server by sending HTTP-requests through the firewall to the MBC Server.
- HTTP is a protocol used for sending and receiving data over the Internet, e.g. HTML-pages that are viewed through a web-browser are sent over the Internet using HTTP.
- Commands to be executed by the MBC Desktop Client e.g. to deliver e-mails from the Outlook inbox to the MBC Server
- the MBC Server is running a number of services, which allows it to deliver e-mails from the firewall protected PC to an external device, such as a mobile device, such as a mobile phone.
- the MBC Server is running POP3 and SMTP services for receiving and sending e-mails from e-mail clients on external devices.
- the mobile device sees the MBC Server as an ordinary e-mail server and connects to the POP3 service and the SMTP service using a standard e-mail client application.
- the server works as a virtual mail server between the MBC Desktop Client and the external device.
- an external device contacts the server to retrieve e-mails using the POP3 protocol
- the server posts a command for the MBC Desktop Client to deliver all unread e-mail messages from the Outlook inbox on the PC.
- the command is collected from the server and executed on the PC.
- the server When sending e-mails from an external device using the SMTP protocol, the server will post the entire message to be collected by the MBC Desktop Client running on the firewall protected PC. The message is subsequently placed in the Outlook outbox on the PC and sent as any other ordinary e-mail. No e-mails are stored on the MBC Server. With every request from an external device, e-mails are retrieved from the firewall protected PC, delivered to the external device and subsequently deleted from the MBC Server.
- any external device containing an e-mail client application can connect to the MBC Server and retrieve e-mails from a firewall protected PC with MBC Desktop Client installed.
- External devices without e-mail clients can connect to the MBC Server using a WAP application, which is provided as part of the MBC solution.
- the MBC solution solves all the three issues through the unique technology in the MBC Desktop Client and the MBC Server.
- the secure gateway - the MBC Desktop Client establishes a secure connection between the firewall protected PC and the MBC Server.
- General firewall configurations place restrictions on all incoming traffic. Direct access from a mobile device to the corporate mailbox is therefore not possible.
- the communication is based on outgoing traffic.
- the MBC Desktop Client is communicating with the MBC Server by sending outgoing HTTP requests through port 80 of the corporate firewall. Since the same protocol and port number is being used for browsing the Internet, general firewall configurations allow the MBC Desktop Client to connect to the MBC Server.
- the MBC Desktop Client is using the outgoing HTTP requests to listen for commands that trigger actions to be performed on the PC.
- the MBC Server places a new command for the MBC Desktop Client. With the following request received from the MBC Desktop Client the command will trigger delivery of unread e-mail messages from the Outlook inbox on the PC.
- the MBC Server acts as a virtual mail server between the PC with the MBC Desktop Client installed and the e-mail client on an external device. But unlike an ordinary POP3 mail server, the MBC Server does not store any e-mails.
- the MBC Server When the MBC Server receives a request from an e-mail client, the request is processed by the MBC Server and sent to the MBC Desktop Client running on the PC of the user. While the e-mail client on the external device is holding an open session, unread e-mails are delivered from the Outlook inbox to the MBC Connection Server and again from the POP3 service of the MBC Server to the external device. After delivery to the mobile device all e-mails are deleted from the MBC Server.
- the MBC Server is acting as an ordinary mail server supporting the POP3 and SMTP protocols. Since POP3 and SMTP are the most basic standards for receiving and sending e-mails, the solution supports all standard e-mail clients.
- the solution In order to allow mobile phones without embedded e-mail clients to use MBC, the solution also implements a WAP e-mail client, which can be used on all WAP enabled devices.
- the MBC solution is designed to allow access to firewall protected e-mails from mobile phones. But the general support for standard e-mail clients means that the solution also supports mobile access to firewall protected e-mails from other external devices like PDA's or laptops.
- E-mail clients used from external devices implement two levels of security:
- the e-mail client does not support encryption of data communication between the client and the mail server. E-mails are received and sent unencrypted. In some cases userid and password used for login on the mail server can be encrypted.
- the e-mail client supports encryption of data communication between the client and the mail server. E-mails are received and sent encrypted if the mail server has implemented support for SSL encryption and the client is configured to use SSL.
- the MBC service can be used in most IT environments, since the MBC Desktop Client is using a standard HTTPS connection for communication between the desktop PC and the MBC Server.
- the MBC Desktop Client maintains an outbound-initiated connection through port 80 using standard https.
- the MBC Desktop Client does not require any change in configuration of the existing network or firewall, because the same kind of connection is used for browsing the world wide web. Because only the out-bound connection is required, there is no "hole" in the firewall and the user can install the MBC Desktop Client and use the service without violating corporate IT security policy.
- the desktop PC must remain on and the e-mail client open in order to exchange incoming messages between the MBC Desktop Client and Server while the user is away from the office.
- the registration of a new user starts at the MBC Web Service.
- the user is requested to enter a mobile phone number (which will be used as username) and choose a password.
- the system automatically generates a 4-digit activation code, which is sent to the users mobile phone via SMS.
- the activation code is only used for first time login. Subsequent logins will be based on the username and password entered by the user.
- the MBC Desktop Client After authentication of the user the MBC Desktop Client can be downloaded and installed on the PC.
- the MBC Desktop Client When installing the MBC Desktop Client the user is prompted for a valid username and password.
- the MBC Desktop Client establishes a secure connection to the MBC Server using Secure Socket Layer (SSL). After authentication of the user a unique key containing username and password is generated and a copy is stored in an encrypted hidden file on the PC.
- SSL Secure Socket Layer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2002342591A AU2002342591A1 (en) | 2002-09-30 | 2002-10-08 | Method for transferring, data, e.g. emails, from a computer protected by a firewall to an external device, e.g. a mobile terminal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US41434302P | 2002-09-30 | 2002-09-30 | |
US60/414,343 | 2002-09-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004030308A1 true WO2004030308A1 (fr) | 2004-04-08 |
Family
ID=32043383
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/DK2002/000674 WO2004030308A1 (fr) | 2002-09-30 | 2002-10-08 | Procede pour transferer des donnees, par ex. des courriers electroniques, entre un ordinateur, protege par un pare-feu, et un dispositif externe, par ex. un terminal mobile |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2002342591A1 (fr) |
WO (1) | WO2004030308A1 (fr) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009031976A1 (fr) | 2007-09-05 | 2009-03-12 | Creative Technology Ltd. | Procédé autorisant l'accès à des données protégées par un pare-feu |
WO2009036679A1 (fr) * | 2007-09-19 | 2009-03-26 | Tencent Technology (Shenzhen) Company Limited | Procédé, système et serveur pour recevoir du courriel |
US8365272B2 (en) | 2007-05-30 | 2013-01-29 | Yoggie Security Systems Ltd. | System and method for providing network and computer firewall protection with dynamic address isolation to a device |
US8381297B2 (en) | 2005-12-13 | 2013-02-19 | Yoggie Security Systems Ltd. | System and method for providing network security to mobile devices |
US8631488B2 (en) | 2008-08-04 | 2014-01-14 | Cupp Computing As | Systems and methods for providing security services during power management mode |
US8789202B2 (en) | 2008-11-19 | 2014-07-22 | Cupp Computing As | Systems and methods for providing real time access monitoring of a removable media device |
US8869270B2 (en) | 2008-03-26 | 2014-10-21 | Cupp Computing As | System and method for implementing content and network security inside a chip |
US9762614B2 (en) | 2014-02-13 | 2017-09-12 | Cupp Computing As | Systems and methods for providing network security using a secure digital device |
US9973501B2 (en) | 2012-10-09 | 2018-05-15 | Cupp Computing As | Transaction security systems and methods |
US10313368B2 (en) | 2005-12-13 | 2019-06-04 | Cupp Computing As | System and method for providing data and device security between external and host devices |
US11157976B2 (en) | 2013-07-08 | 2021-10-26 | Cupp Computing As | Systems and methods for providing digital content marketplace security |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999051003A2 (fr) * | 1998-04-01 | 1999-10-07 | Telia Ab (Publ) | Ameliorations concernant des badges electroniques |
US6012088A (en) * | 1996-12-10 | 2000-01-04 | International Business Machines Corporation | Automatic configuration for internet access device |
US6104716A (en) * | 1997-03-28 | 2000-08-15 | International Business Machines Corporation | Method and apparatus for lightweight secure communication tunneling over the internet |
WO2002006963A1 (fr) * | 2000-07-19 | 2002-01-24 | Fusionone, Inc. | Appareil a architecture de communication d'acces a distance et procede associe |
WO2002046971A1 (fr) * | 2000-12-05 | 2002-06-13 | Softdomain | Agent de service a distance destine a l'envoi de commandes et a la reception de donnees par un reseau de courriels |
-
2002
- 2002-10-08 AU AU2002342591A patent/AU2002342591A1/en not_active Abandoned
- 2002-10-08 WO PCT/DK2002/000674 patent/WO2004030308A1/fr not_active Application Discontinuation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6012088A (en) * | 1996-12-10 | 2000-01-04 | International Business Machines Corporation | Automatic configuration for internet access device |
US6104716A (en) * | 1997-03-28 | 2000-08-15 | International Business Machines Corporation | Method and apparatus for lightweight secure communication tunneling over the internet |
WO1999051003A2 (fr) * | 1998-04-01 | 1999-10-07 | Telia Ab (Publ) | Ameliorations concernant des badges electroniques |
WO2002006963A1 (fr) * | 2000-07-19 | 2002-01-24 | Fusionone, Inc. | Appareil a architecture de communication d'acces a distance et procede associe |
WO2002046971A1 (fr) * | 2000-12-05 | 2002-06-13 | Softdomain | Agent de service a distance destine a l'envoi de commandes et a la reception de donnees par un reseau de courriels |
Cited By (58)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10417421B2 (en) | 2005-12-13 | 2019-09-17 | Cupp Computing As | System and method for providing network security to mobile devices |
US10839075B2 (en) | 2005-12-13 | 2020-11-17 | Cupp Computing As | System and method for providing network security to mobile devices |
US10621344B2 (en) | 2005-12-13 | 2020-04-14 | Cupp Computing As | System and method for providing network security to mobile devices |
US10541969B2 (en) | 2005-12-13 | 2020-01-21 | Cupp Computing As | System and method for implementing content and network security inside a chip |
US9747444B1 (en) | 2005-12-13 | 2017-08-29 | Cupp Computing As | System and method for providing network security to mobile devices |
US8381297B2 (en) | 2005-12-13 | 2013-02-19 | Yoggie Security Systems Ltd. | System and method for providing network security to mobile devices |
US8627452B2 (en) | 2005-12-13 | 2014-01-07 | Cupp Computing As | System and method for providing network security to mobile devices |
US9497622B2 (en) | 2005-12-13 | 2016-11-15 | Cupp Computing As | System and method for providing network security to mobile devices |
US10089462B2 (en) | 2005-12-13 | 2018-10-02 | Cupp Computing As | System and method for providing network security to mobile devices |
US11822653B2 (en) | 2005-12-13 | 2023-11-21 | Cupp Computing As | System and method for providing network security to mobile devices |
US11461466B2 (en) | 2005-12-13 | 2022-10-04 | Cupp Computing As | System and method for providing network security to mobile devices |
US20150215282A1 (en) | 2005-12-13 | 2015-07-30 | Cupp Computing As | System and method for implementing content and network security inside a chip |
US9781164B2 (en) | 2005-12-13 | 2017-10-03 | Cupp Computing As | System and method for providing network security to mobile devices |
US10313368B2 (en) | 2005-12-13 | 2019-06-04 | Cupp Computing As | System and method for providing data and device security between external and host devices |
US11652829B2 (en) | 2007-03-05 | 2023-05-16 | Cupp Computing As | System and method for providing data and device security between external and host devices |
US10419459B2 (en) | 2007-03-05 | 2019-09-17 | Cupp Computing As | System and method for providing data and device security between external and host devices |
US10999302B2 (en) | 2007-03-05 | 2021-05-04 | Cupp Computing As | System and method for providing data and device security between external and host devices |
US10567403B2 (en) | 2007-03-05 | 2020-02-18 | Cupp Computing As | System and method for providing data and device security between external and host devices |
US10284603B2 (en) | 2007-05-30 | 2019-05-07 | Cupp Computing As | System and method for providing network and computer firewall protection with dynamic address isolation to a device |
US20180302444A1 (en) | 2007-05-30 | 2018-10-18 | Cupp Computing As | System and method for providing network and computer firewall protection with dynamic address isolation to a device |
US11757941B2 (en) | 2007-05-30 | 2023-09-12 | CUPP Computer AS | System and method for providing network and computer firewall protection with dynamic address isolation to a device |
US8365272B2 (en) | 2007-05-30 | 2013-01-29 | Yoggie Security Systems Ltd. | System and method for providing network and computer firewall protection with dynamic address isolation to a device |
US10904293B2 (en) | 2007-05-30 | 2021-01-26 | Cupp Computing As | System and method for providing network and computer firewall protection with dynamic address isolation to a device |
US10057295B2 (en) | 2007-05-30 | 2018-08-21 | Cupp Computing As | System and method for providing network and computer firewall protection with dynamic address isolation to a device |
US9391956B2 (en) | 2007-05-30 | 2016-07-12 | Cupp Computing As | System and method for providing network and computer firewall protection with dynamic address isolation to a device |
US9756079B2 (en) | 2007-05-30 | 2017-09-05 | Cupp Computing As | System and method for providing network and computer firewall protection with dynamic address isolation to a device |
TWI473483B (zh) * | 2007-09-05 | 2015-02-11 | Creative Tech Ltd | 能夠存取被防火牆保護的資料之方法 |
US8281384B2 (en) | 2007-09-05 | 2012-10-02 | Creative Technology Ltd | Method of enabling access to data protected by firewall |
WO2009031976A1 (fr) | 2007-09-05 | 2009-03-12 | Creative Technology Ltd. | Procédé autorisant l'accès à des données protégées par un pare-feu |
WO2009036679A1 (fr) * | 2007-09-19 | 2009-03-26 | Tencent Technology (Shenzhen) Company Limited | Procédé, système et serveur pour recevoir du courriel |
US8204947B2 (en) | 2007-09-19 | 2012-06-19 | Tencent Technology (Shenzhen) Company Ltd. | Method, system and server for popping E-mail |
US8869270B2 (en) | 2008-03-26 | 2014-10-21 | Cupp Computing As | System and method for implementing content and network security inside a chip |
US11757835B2 (en) | 2008-03-26 | 2023-09-12 | Cupp Computing As | System and method for implementing content and network security inside a chip |
US11050712B2 (en) | 2008-03-26 | 2021-06-29 | Cupp Computing As | System and method for implementing content and network security inside a chip |
US8631488B2 (en) | 2008-08-04 | 2014-01-14 | Cupp Computing As | Systems and methods for providing security services during power management mode |
US11449613B2 (en) | 2008-08-04 | 2022-09-20 | Cupp Computing As | Systems and methods for providing security services during power management mode |
US9106683B2 (en) | 2008-08-04 | 2015-08-11 | Cupp Computing As | Systems and methods for providing security services during power management mode |
US9843595B2 (en) | 2008-08-04 | 2017-12-12 | Cupp Computing As | Systems and methods for providing security services during power management mode |
US11775644B2 (en) | 2008-08-04 | 2023-10-03 | Cupp Computing As | Systems and methods for providing security services during power management mode |
US10084799B2 (en) | 2008-08-04 | 2018-09-25 | Cupp Computing As | Systems and methods for providing security services during power management mode |
US9516040B2 (en) | 2008-08-04 | 2016-12-06 | Cupp Computing As | Systems and methods for providing security services during power management mode |
US11947674B2 (en) | 2008-08-04 | 2024-04-02 | Cupp Computing As | Systems and methods for providing security services during power management mode |
US10404722B2 (en) | 2008-08-04 | 2019-09-03 | Cupp Computing As | Systems and methods for providing security services during power management mode |
US11036836B2 (en) | 2008-11-19 | 2021-06-15 | Cupp Computing As | Systems and methods for providing real time security and access monitoring of a removable media device |
US10417400B2 (en) | 2008-11-19 | 2019-09-17 | Cupp Computing As | Systems and methods for providing real time security and access monitoring of a removable media device |
US11604861B2 (en) | 2008-11-19 | 2023-03-14 | Cupp Computing As | Systems and methods for providing real time security and access monitoring of a removable media device |
US8789202B2 (en) | 2008-11-19 | 2014-07-22 | Cupp Computing As | Systems and methods for providing real time access monitoring of a removable media device |
US9973501B2 (en) | 2012-10-09 | 2018-05-15 | Cupp Computing As | Transaction security systems and methods |
US11757885B2 (en) | 2012-10-09 | 2023-09-12 | Cupp Computing As | Transaction security systems and methods |
US10397227B2 (en) | 2012-10-09 | 2019-08-27 | Cupp Computing As | Transaction security systems and methods |
US10904254B2 (en) | 2012-10-09 | 2021-01-26 | Cupp Computing As | Transaction security systems and methods |
US11157976B2 (en) | 2013-07-08 | 2021-10-26 | Cupp Computing As | Systems and methods for providing digital content marketplace security |
US10291656B2 (en) | 2014-02-13 | 2019-05-14 | Cupp Computing As | Systems and methods for providing network security using a secure digital device |
US11743297B2 (en) | 2014-02-13 | 2023-08-29 | Cupp Computing As | Systems and methods for providing network security using a secure digital device |
US11316905B2 (en) | 2014-02-13 | 2022-04-26 | Cupp Computing As | Systems and methods for providing network security using a secure digital device |
US10666688B2 (en) | 2014-02-13 | 2020-05-26 | Cupp Computing As | Systems and methods for providing network security using a secure digital device |
US9762614B2 (en) | 2014-02-13 | 2017-09-12 | Cupp Computing As | Systems and methods for providing network security using a secure digital device |
US20180205760A1 (en) | 2014-02-13 | 2018-07-19 | Cupp Computing As | Systems and methods for providing network security using a secure digital device |
Also Published As
Publication number | Publication date |
---|---|
AU2002342591A1 (en) | 2004-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210359967A1 (en) | System and method of a relay server for managing communications and notification between a mobile device and application server | |
US10298708B2 (en) | Targeted notification of content availability to a mobile device | |
CA2305358C (fr) | Systeme et procede permettant de faire suivre du courrier electronique | |
US8719397B2 (en) | Method and system for email and PIM synchronization and updating | |
US9252977B2 (en) | Method and system for an uncompromising connection from a computing device having information storage like email server to a wireless mobile device | |
JP4686596B2 (ja) | 個人識別番号メッセージ伝達のためのシステムおよび方法 | |
US20020123328A1 (en) | Method and system for pushing e-mails to a mobile device | |
US20080305776A1 (en) | System and method for wirelessly provisioning a mobile communication device | |
US20150215291A1 (en) | Secure decentralized content management platform and transparent gateway | |
US20020103851A1 (en) | Remote proxy server agent | |
US11575767B2 (en) | Targeted notification of content availability to a mobile device | |
WO2004030308A1 (fr) | Procede pour transferer des donnees, par ex. des courriers electroniques, entre un ordinateur, protege par un pare-feu, et un dispositif externe, par ex. un terminal mobile | |
US20080242327A1 (en) | System and method for sending sms and text messages | |
US20050015617A1 (en) | Internet security | |
EP2608591B1 (fr) | Auto-configuration d'un terminal mobile pour la connexion à un réseau sans fil sécurisé | |
US20080102747A1 (en) | SSL-Based Mobile Virtual Private Networking Solution | |
US20040184613A1 (en) | Method of safely sending e-mails over LAN | |
EP1976234A1 (fr) | Méthode et un systeme pour l'email et les pim synchronisation et de mise a jour | |
CA2409327A1 (fr) | Plate-forme de serveur mobile pour entreprises |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |