Systems and methods for controlling email access
First Claim
Patent Images
1. A system, comprising at least one processor and at least one memory device;
- storing computer-executable instructions that, when executed by one or more processors, cause the system to perform operations comprising;
receiving an email comprising a plurality of email resources, the plurality of email resources comprising at least one email attachment and at least one email message;
identifying at least one resource rule associated with the at least one email attachment, the at least one resource rule comprising a variable stringency;
adjusting, based at least in part on at least one device profile describing at least one state of at least one client device, the variable stringency of the at least one resource rule;
removing, in accordance with the at least one resource rule, the at least one email attachment from the plurality of email resources;
encrypting, in accordance with the at least one resource rule, the at least one email attachment, thereby creating at least one encrypted email attachment, the at least one encrypted email attachment being configured to be decrypted using one or more cryptographic keys accessible to at least one secure container application executable on the at least one client device; and
causing one or more remaining email resources of the plurality of email resources to be made accessible to the at least one client device, the one or more remaining email resources comprising the at least one email message;
wherein adjusting the variable stringency of the at least one resource rule comprises associating one or more of a plurality of access restrictions with the at least one resource rule.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys.
210 Citations
20 Claims
-
1. A system, comprising at least one processor and at least one memory device;
storing computer-executable instructions that, when executed by one or more processors, cause the system to perform operations comprising; receiving an email comprising a plurality of email resources, the plurality of email resources comprising at least one email attachment and at least one email message; identifying at least one resource rule associated with the at least one email attachment, the at least one resource rule comprising a variable stringency; adjusting, based at least in part on at least one device profile describing at least one state of at least one client device, the variable stringency of the at least one resource rule; removing, in accordance with the at least one resource rule, the at least one email attachment from the plurality of email resources; encrypting, in accordance with the at least one resource rule, the at least one email attachment, thereby creating at least one encrypted email attachment, the at least one encrypted email attachment being configured to be decrypted using one or more cryptographic keys accessible to at least one secure container application executable on the at least one client device; and causing one or more remaining email resources of the plurality of email resources to be made accessible to the at least one client device, the one or more remaining email resources comprising the at least one email message; wherein adjusting the variable stringency of the at least one resource rule comprises associating one or more of a plurality of access restrictions with the at least one resource rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A method comprising:
-
receiving an email comprising a plurality of email resources, the plurality of email resources comprising at least one email attachment and at least one email message; identifying at least one resource rule associated with the at least one email attachment, the at least one resource rule comprising a variable stringency; adjusting, based at least in part on at least one device profile describing at least one state of at least one client device, the variable stringency of the at least one resource rule; removing, in accordance with the at least one resource rule, the at least one email attachment from the plurality of email resources; encrypting, in accordance with the at least one resource rule, the at least one email attachment, thereby creating at least one encrypted email attachment, the at least one encrypted email attachment being configured to be decrypted using one or more cryptographic keys accessible to at least one secure container application executable on the at least one client device; and causing one or more remaining email resources of the plurality of email resources to be made accessible to the at least one client device, the one or more remaining email resources comprising the at least one email message; wherein adjusting the variable stringency of the at least one resource rule comprises associating one or more of a plurality of access restrictions with the at least one resource rule. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A non-transitory computer-readable medium embodying a program executable in at least one computing device, the program comprising code, which when executed, causes the at least one computing device to perform a method comprising:
-
receiving an email comprising a plurality of email resources, the plurality of email resources comprising at least one email attachment and at least one email message; identifying at least one resource rule associated with the at least one email attachment, the at least one resource rule comprising a variable stringency; adjusting, based at least in part on at least one device profile describing at least one state of at least one client device, the variable stringency of the at least one resource rule; removing, in accordance with the at least one resource rule, the at least one email attachment from the plurality of email resources; encrypting, in accordance with the at least one resource rule, the at least one email attachment, thereby creating at least one encrypted email attachment, the at least one encrypted email attachment being configured to be decrypted using one or more cryptographic keys accessible to at least one secure container application executable on the at least one client device; and causing one or more remaining email resources of the plurality of email resources to be made accessible to the at least one client device, the one or more remaining email resources comprising the at least one email message; wherein adjusting the variable stringency of the at least one resource rule comprises associating one or more of a plurality of access restrictions with the at least one resource rule. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification