On-Demand Security Policy Activation
First Claim
Patent Images
1. A method comprising:
- receiving a selection of a link;
determining whether the link is associated with a security policy; and
in response to determining that the link is associated with the security policy;
activating a profile identified by the security policy, andopening the link according to the security policy, wherein opening the link according to the security policy comprises redirecting the opening of the link to the secure file from a first application to a second application.
4 Assignments
0 Petitions
Accused Products
Abstract
On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the link may be activated and the link may be opened according to the security policy. In some embodiments, opening the link according to the security policy may comprise redirecting the opening of the link from a first application to a second application.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving a selection of a link; determining whether the link is associated with a security policy; and in response to determining that the link is associated with the security policy; activating a profile identified by the security policy, and opening the link according to the security policy, wherein opening the link according to the security policy comprises redirecting the opening of the link to the secure file from a first application to a second application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a memory storage; and a processor coupled to the memory storage, wherein the processor is configured to; display a link, receive a request to open the link, determine whether the link comprises a link to a secure file, in response to determining that the link comprises the link to the secure file, determine whether a security policy applies to opening the link to the secure file, and in response to determining that the security policy applies to opening the link to the secure file, open the link to the secure file in accordance with the security policy, wherein being operative to open the link to the secure file in accordance with the security policy comprises being operative to redirect the opening of the link to the secure file from a first application to a second application. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-readable medium which stores a set of instructions that when executed performs a method executed by the set of instructions comprising:
-
receiving a selection of a link to a resource; determining whether the resource comprises a secure resource; and in response to determining that the resource comprises a secure resource; activating a security policy, and opening the link in accordance with the security policy, wherein opening the link in accordance with the security policy comprises redirecting the opening of the link from a first application to a second application. - View Dependent Claims (17, 18, 19, 20)
-
Specification