Systems and Methods for Controlling Email Access
First Claim
Patent Images
1. A method, comprising:
- identifying, by an access control server, a plurality of email resources associated with at least one client device;
identifying, using the access control server, at least one resource rule;
determining, in the access control server, whether the email resources satisfy the at least one resource rule; and
,modifying, by the access control server, the email resources based at least in part on at least one resource rule in response to determination that the email resources do not satisfy the resource rules.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the disclosure relate to identifying email resources associated with client devices, identifying resource rules, determining whether the email resources satisfy the resource rules, and modifying the email resources based on the resource rules if the resource rules are not satisfied by the email resources.
17 Citations
20 Claims
-
1. A method, comprising:
-
identifying, by an access control server, a plurality of email resources associated with at least one client device; identifying, using the access control server, at least one resource rule; determining, in the access control server, whether the email resources satisfy the at least one resource rule; and
,modifying, by the access control server, the email resources based at least in part on at least one resource rule in response to determination that the email resources do not satisfy the resource rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium embodying a program executable in a client device, the program comprising code, which when executed, causes the client device to at least:
-
receive, on the client device, at least one email resource; identify, on the client device, at least one resource rule; determine, in the client device, whether the at least one email resource satisfies the at least one resource rule; and modify, using the client device, the email resources based at least in part on the resource rules responsive to a determination that the email resources do not satisfy the resource rules. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
identifying a plurality of email resources accessible by a client device; identifying at least one resource rule associated with the email resources; determining whether at least one of the client device or the plurality of email resources satisfy the at least one resource rule; modifying at least a portion of the plurality of email resources in response to a determination that the at least one resource rule is violated; and authorizing the client device to access the email resources associated with the client device in response to a determination that the at least one resource rule is not violated. - View Dependent Claims (18, 19, 20)
-
Specification