Systems and methods for controlling email access
First Claim
1. A non-transitory computer-readable medium embodying a program executable in a computing device comprising code that, when executed, causes the computing device to at least:
- access an email message received by the computing device;
identify a uniform resource locator (URL) within the email message, wherein the URL corresponds to a resource residing in a protected location that is not accessible by a native browser application of the computing device;
determine whether the computing device is permitted to access the URL; and
request access to the resources through a secure browser application of the computing device, the secure browser application being different from the native browser application, upon a determination that the computing device is permitted to access the resource in accordance with at least one resource rule, wherein the secure browser application is capable of accessing the resource residing in the protected location in compliance with the at least one resource rule.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the disclosure relate to controlling access to email content. According to various embodiments as described herein, an email message may be accessed by a computing device to identify a uniform resource locator (URL) within the email message, wherein the URL corresponds to a resource residing in a protected location that is not accessible by a native browser application of the client device. The computing device may determine whether the client device is permitted to access the URL and request access to the resource via the secure browser application of the client device upon a determination that the client device is permitted to access the resource in accordance with the at least one resource rule.
-
Citations
20 Claims
-
1. A non-transitory computer-readable medium embodying a program executable in a computing device comprising code that, when executed, causes the computing device to at least:
-
access an email message received by the computing device; identify a uniform resource locator (URL) within the email message, wherein the URL corresponds to a resource residing in a protected location that is not accessible by a native browser application of the computing device; determine whether the computing device is permitted to access the URL; and request access to the resources through a secure browser application of the computing device, the secure browser application being different from the native browser application, upon a determination that the computing device is permitted to access the resource in accordance with at least one resource rule, wherein the secure browser application is capable of accessing the resource residing in the protected location in compliance with the at least one resource rule. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
accessing, by a computing device, an email message received by the computing device; identifying, by the computing device, a uniform resource locator (URL) within the email message, wherein the URL corresponds to a resource residing in a protected location that is not accessible by a native browser application of the computing device; determining, by the computing device, whether the computing device is permitted to access the URL; and requesting, by the computing device, access to the resource through a secure browser application of the computing, the secure browser application being different from the native browser application, upon a determination that the computing device is permitted to access the resource in accordance with at least one resource rule, wherein the secure browser application is capable of accessing the resource residing in the protected location in compliance with the at least one resource rule. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
a client device comprising processing circuitry; and at least one client application executable by the client device, the at least one client application comprising program code that, when executed, causes the client device to; access an email message received by the client device; identify a uniform resource locator (URL) within the email message, wherein the URL corresponds to a resource residing in a protected location that is not accessible by a native browser application of the client device; determine whether the client device is permitted to access the URL; and request access to the resource through a secure browser application of the client device, the secure browser application being different from the native browser application, upon a determination that the client device is permitted to access the resource in accordance with the at least one resource rule, wherein the secure browser application is capable of accessing the resource residing in the protected location in compliance with the at least one resource rule. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification