Systems and Methods for Controlling Email Access
First Claim
Patent Images
1. A system, comprising:
- at least one client device;
at least one email service; and
,at least one memory device for storing computer-executable instructions that, when executed by at least one processor, configures the processors to perform operations comprising;
proxying at least one email resource from the email services to the client devices;
determining whether the email resources are accessible to the client devices via at least one unauthorized application on the client devices; and
,responsive to a determination that the email resources are accessible via the unauthorized applications on the client devices, modifying the email resources to be inaccessible via the unauthorized applications on the client devices.
5 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, determining whether the email resources are accessible to the client devices via at least one unauthorized application on the client devices, and modifying the email resources to be inaccessible via the unauthorized applications on the client devices in response to a determination that the email resources are accessible via the unauthorized applications on the client devices.
-
Citations
30 Claims
-
1. A system, comprising:
-
at least one client device; at least one email service; and
,at least one memory device for storing computer-executable instructions that, when executed by at least one processor, configures the processors to perform operations comprising; proxying at least one email resource from the email services to the client devices; determining whether the email resources are accessible to the client devices via at least one unauthorized application on the client devices; and
,responsive to a determination that the email resources are accessible via the unauthorized applications on the client devices, modifying the email resources to be inaccessible via the unauthorized applications on the client devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising the steps of:
-
identifying at least one email resource on at least one client device; determining whether the email resources are accessible via at least one unauthorized application on the client devices; and
,responsive to a determination that the email resources are accessible via the unauthorized applications on the client devices, modifying the email resources to be inaccessible via the unauthorized applications on the client devices. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium embodying a program executable in a computing device, the program comprising code, which when executed, causes the computing device to perform a method comprising the steps of:
-
identifying at least one email resource; determining whether the email resources are accessible via at least one unauthorized application on at least one client device; and
,responsive to a determination that the email resources are accessible via the unauthorized applications on the client devices, modifying the email resources to be inaccessible via the unauthorized applications on the client devices. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification