×

Systems and methods for controlling email access

  • US 9,426,129 B2
  • Filed: 07/22/2014
  • Issued: 08/23/2016
  • Est. Priority Date: 12/06/2012
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, comprising code that:

  • accesses an email resource in transit to a client device from at least one email service, the email resource comprising an email attachment;

    identifies a compliance rule associated with the email resource, the compliance rule specifying that the email resource may only be accessed if the email attachment is removed from the email resource and is encrypted with a cryptographic key accessible to a secure container application, the secure container application being configured to prohibit performing at least one of a cut function, a copy function, or a screen capture function while the email attachment is accessed;

    removes the email attachment from the email resource in accordance with the compliance rule;

    generates an encrypted email attachment from the email attachment using the cryptographic key accessible to the secure container application in accordance with the compliance rule; and

    causes a transmission of the email resource and the encrypted email attachment to the client device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×