Systems and methods for controlling email access
First Claim
Patent Images
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, comprising code that:
- accesses an email resource in transit to a client device from at least one email service, the email resource comprising an email attachment;
identifies a compliance rule associated with the email resource, the compliance rule specifying that the email resource may only be accessed if the email attachment is removed from the email resource and is encrypted with a cryptographic key accessible to a secure container application, the secure container application being configured to prohibit performing at least one of a cut function, a copy function, or a screen capture function while the email attachment is accessed;
removes the email attachment from the email resource in accordance with the compliance rule;
generates an encrypted email attachment from the email attachment using the cryptographic key accessible to the secure container application in accordance with the compliance rule; and
causes a transmission of the email resource and the encrypted email attachment to the client device.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys.
231 Citations
20 Claims
-
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, comprising code that:
-
accesses an email resource in transit to a client device from at least one email service, the email resource comprising an email attachment; identifies a compliance rule associated with the email resource, the compliance rule specifying that the email resource may only be accessed if the email attachment is removed from the email resource and is encrypted with a cryptographic key accessible to a secure container application, the secure container application being configured to prohibit performing at least one of a cut function, a copy function, or a screen capture function while the email attachment is accessed; removes the email attachment from the email resource in accordance with the compliance rule; generates an encrypted email attachment from the email attachment using the cryptographic key accessible to the secure container application in accordance with the compliance rule; and causes a transmission of the email resource and the encrypted email attachment to the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
at least one computing device; and program code executed in the at least one computing device that causes the at least one computing device to at least; access an email resource in transit to a client device from at least one email service, the email resource comprising at least one email attachment; identify a compliance rule associated with the email resource, the compliance rule specifying that the email resource may only be accessed if the at least one email attachment is removed from the email resource and is encrypted with a cryptographic key accessible to a secure container application, the secure container application being configured to prohibit performing at least one of a cut function, a copy function, or a screen capture function while the at least one email attachment is accessed; remove the at least one email attachment from the email resource in accordance with the compliance rule; generate at least one encrypted email attachment from the at least one email attachment using the cryptographic key accessible to the secure container application in accordance with the compliance rule; and cause a transmission of the email resource and the at least one encrypted email attachment to a user device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
accessing, by at least one computing device, an email resource in transit to a client device from at least one email service, the email resource comprising at least one email attachment; identifying, by the at least one computing device, a compliance rule associated with the email resource, the compliance rule specifying that the email resource may only be accessed if the at least one email attachment is removed from the email resource and is encrypted with a cryptographic key accessible to a secure container application, the secure container application being configured to prohibit performing at least one of a cut function, a copy function, or a screen capture function while the at least one email attachment is accessed; removing, by the at least one computing device, the at least one email attachment from the email resource in accordance with the compliance rule; generating, by the at least one computing device, at least one encrypted email attachment from the at least one email attachment using the cryptographic key accessible to the secure container application in accordance with the compliance rule; and causing, by the at least one computing device, a transmission of the email resource and the at least one encrypted email attachment to a user device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification