Systems and methods for controlling email access
First Claim
Patent Images
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, comprising program code that, when executed, causes the at least one computing device to:
- access an email resource requested by a client device from at least one email service;
identify a uniform resource locator (URL) within the email resource;
determine whether the URL is required to be accessed by a particular browser application; and
responsive to determining that the URL is required to be accessed by the particular browser application, modify the URL within the email resource to include a designation of the particular browser application, wherein the URL as modified cannot be accessed by at least one browser application other than the particular browser application.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the disclosure relate to proxying at least one email resource in transit to at least one client device from at least one email service, removing at least one URL from the email resources, and adding at least one modified URL to the email resources.
218 Citations
20 Claims
-
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, comprising program code that, when executed, causes the at least one computing device to:
-
access an email resource requested by a client device from at least one email service; identify a uniform resource locator (URL) within the email resource; determine whether the URL is required to be accessed by a particular browser application; and responsive to determining that the URL is required to be accessed by the particular browser application, modify the URL within the email resource to include a designation of the particular browser application, wherein the URL as modified cannot be accessed by at least one browser application other than the particular browser application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system, comprising:
-
at least one computing device that comprises at least one hardware processor; and program code executed in the at least one computing device that causes the at least one computing device to at least; proxy an email server executing an email service to access an email resource requested by a client device from the email service; identify a uniform resource locator (URL) within the email resource; determine whether the URL is required to be accessed by a particular browser application; and responsive to determining that the URL is required to be accessed by the particular browser application, modify the URL within the email resource to include a designation of the particular browser application, wherein the URL as modified cannot be accessed by at least one browser application other than the particular browser application. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
accessing, by at least one computing device that comprises at least one hardware processor, an email resource requested by a client device from an email service; identifying, by the at least one computing device, a uniform resource locator (URL) within the email resource; determining, by the at least one computing device, whether the URL is required to be accessed by a particular browser application; and responsive to determining that the URL is required to be accessed by the particular browser application, modifying, by the at least one computing device, the URL within the email resource to include a designation of the particular browser application, wherein the URL as modified cannot be accessed by at least one browser application other than the particular browser application. - View Dependent Claims (17, 18, 19, 20)
-
Specification