SECURED ATTACHMENT MANAGEMENT
First Claim
1. A method, comprising:
- receiving, by at least one computing device, an invitee list and a schedule associated with an event;
generating, by the at least one computing device, a calendar message for the event based on the invitee list and the schedule;
identifying, by the at least one computing device, a file for attachment to the calendar message, the file being identified through an extension of at least one function of a secure content file manager to a message handling application;
determining, by the at least one computing device, that sharing the file is permitted;
generating, by the at least one computing device, a resource locator associated with the file, wherein the resource locator uniquely identifies the file in a managed computing device environment;
inserting, by the at least one computing device, the resource locator into the calendar message; and
forwarding, by the at least one computing device, the calendar message to distribute the file for access on at least one other computing device using the resource locator.
1 Assignment
0 Petitions
Accused Products
Abstract
The secure management of attachments is described. In one example, files are identified for attachment to a message through a secure content application extension. Rather than directly attaching the files to the message, a resource locator or link to the files is generated, and the resource locator is inserted into the message. The message is then forwarded for distribution to client devices based on an addressee list for the message. The distribution of and access to the files is managed separately by a management service. The management service can notify the client devices to retrieve the files based on a file access schedule. At each of the client devices, users can access the files through a secure content file application extension using the resource locator during the file access schedule. Thus, the files are distributed through secure content file applications and not as direct attachments to messages.
48 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by at least one computing device, an invitee list and a schedule associated with an event; generating, by the at least one computing device, a calendar message for the event based on the invitee list and the schedule; identifying, by the at least one computing device, a file for attachment to the calendar message, the file being identified through an extension of at least one function of a secure content file manager to a message handling application; determining, by the at least one computing device, that sharing the file is permitted; generating, by the at least one computing device, a resource locator associated with the file, wherein the resource locator uniquely identifies the file in a managed computing device environment; inserting, by the at least one computing device, the resource locator into the calendar message; and forwarding, by the at least one computing device, the calendar message to distribute the file for access on at least one other computing device using the resource locator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium embodying program code executable in at least one computing device that, when executed by the at least one computing device, directs the at least one computing device to at least:
-
receive an addressee list and a message body associated with a message; generate the message based on the addressee list; identify a file for attachment to the message through an extension of at least one function of a secure content file manager to another application; determine whether sharing the file is permitted; generate a resource locator associated with the file and insert the resource locator into the message in response to a determination that sharing the file is permitted; and forward the message to distribute the file for access on at least one other computing device using the resource locator, wherein the resource locator unique identifies the file in a managed computing device environment. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system, comprising:
-
a memory device configured to store computer-readable instructions thereon; and at least one computing device configured, through execution of the computer-readable instructions, to; identify a file for attachment to a message through an extension to a secure content file manager; determine that sharing the file is permitted; generate a resource locator to the file, wherein the resource locator unique identifies the file in a managed computing device environment; insert the resource locator into the message; and forward the message based on at least one addressee of the message, to distribute the file for access by the at least one addressee using the resource locator. - View Dependent Claims (17, 18, 19, 20)
-
Specification