Systems and methods for controlling email access
First Claim
Patent Images
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device comprising at least one hardware processor, the program comprising code that, when executed by the at least one computing device, causes the at least one computing device to:
- access an email resource requested by a client device from at least one email service;
identify a resource rule specifying a condition for which the client device is authorized to access the email resource, the resource rule being identified based at least in part on a device state of the client device;
determine whether the email resource satisfies the resource rule based at least in part on a stringency level associated with the resource rule, the stringency level being increased or reduced based at least in part on the device state;
responsive to the email resource failing to satisfy the resource rule, modify the email resource causing the email resource to satisfy the resource rule; and
responsive to the email resource, as modified, satisfying the resource rule, authorize the client device to access the email resource.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least one resource rule associated with the email resources, and adding at least one URL to the email resources in accordance with the resource rules.
213 Citations
31 Claims
-
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device comprising at least one hardware processor, the program comprising code that, when executed by the at least one computing device, causes the at least one computing device to:
-
access an email resource requested by a client device from at least one email service; identify a resource rule specifying a condition for which the client device is authorized to access the email resource, the resource rule being identified based at least in part on a device state of the client device; determine whether the email resource satisfies the resource rule based at least in part on a stringency level associated with the resource rule, the stringency level being increased or reduced based at least in part on the device state; responsive to the email resource failing to satisfy the resource rule, modify the email resource causing the email resource to satisfy the resource rule; and responsive to the email resource, as modified, satisfying the resource rule, authorize the client device to access the email resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system, comprising:
-
a first computing device comprising at least one hardware processor; and program code executed in the first computing device that causes the first computing device to at least; proxy a second computing device to access an email resource requested by a client device from an email service; identify a resource rule specifying a condition for which the client device is authorized to access the email resource, the resource rule being identified based at least in part on a device state associated with the client device; determine whether the email resource satisfies the resource rule based at least in part on a stringency level associated with the resource rule, the stringency level being increased or reduced based at least in part on the device state; responsive to the email resource failing to satisfy the resource rule, modify the email resource to satisfy the resource rule; and responsive to the email resource satisfying the resource rule, authorize the client device to access the email resource. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method, comprising:
-
accessing, by a first computing device comprising at least one hardware processor, an email resource from a second computing device, the email resource being requested by a client device from an email service; identifying, by the first computing device, a resource rule specifying a condition for which the client device is authorized to access the email resource, the resource rule being identified based at least in part on a device state associated with the client device; determining, by the first computing device, whether the email resource satisfies the resource rule based at least in part on a stringency level associated with the resource rule, the stringency level being increased or reduced based at least in part on the device state; responsive to the email resource failing to satisfy the resource rule, modifying, by the first computing device, the email resource to satisfy the resource rule; and responsive to the email resource satisfying the resource rule, authorizing, by the first computing device, the client device to access the email resource. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification