On-demand security policy activation
First Claim
Patent Images
1. A method comprising:
- receiving, using an email application in at least one mobile computing device, a user selection of a resource locator displayed in an email message, wherein the resource locator comprises a reference to a resource;
determining, using the at least one mobile computing device, whether the resource locator selected from the email message is associated with a security policy; and
in response to determining that the resource locator is associated with the security policy;
activating, in the at least one mobile computing device, a profile identified by the security policy, wherein the profile specifies that a secure application is permitted to access the resource referred to by the resource locator; and
accessing the resource referred to by the resource locator using the secure application specified by the profile instead of another application installed on the mobile computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the link may be activated and the link may be opened according to the security policy. In some embodiments, opening the link according to the security policy may comprise redirecting the opening of the link from a first application to a second application.
244 Citations
20 Claims
-
1. A method comprising:
- receiving, using an email application in at least one mobile computing device, a user selection of a resource locator displayed in an email message, wherein the resource locator comprises a reference to a resource;
determining, using the at least one mobile computing device, whether the resource locator selected from the email message is associated with a security policy; and
in response to determining that the resource locator is associated with the security policy;
activating, in the at least one mobile computing device, a profile identified by the security policy, wherein the profile specifies that a secure application is permitted to access the resource referred to by the resource locator; and
accessing the resource referred to by the resource locator using the secure application specified by the profile instead of another application installed on the mobile computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 18)
- receiving, using an email application in at least one mobile computing device, a user selection of a resource locator displayed in an email message, wherein the resource locator comprises a reference to a resource;
-
10. A system comprising:
- a memory storage storing program code, wherein the program code comprises an email application and a secure application; and
at least one processor coupled to the memory storage, wherein, upon execution, the program code causes the at least one processor to at least;
render a resource locator for display in a user interface for the email application;
receive, using the email application, a user selection of the resource locator;
determine whether the resource locator selected using the email application refers to a secure file;
in response to determining that the resource locator refers to the secure file, determine whether a security policy is associated with the secure file; and
in response to determining that the security policy is associated with the secure file;
activate a profile associated with the security policy, wherein the profile specifies that a secure application is permitted to access the resource referred to by the resource locator; and
access the resource referred to by the resource locator using the secure application instead of another application. - View Dependent Claims (11, 12, 13, 19)
- a memory storage storing program code, wherein the program code comprises an email application and a secure application; and
-
14. A non-transitory computer-readable medium that stores a set of instructions that, when executed by at least one processor, performs a method executed by the at least one processor, comprising:
- receiving, using an email application, a user selection of a resource locator rendered in a user interface for the email application, wherein the resource locator comprises a reference to a resource;
determining whether the resource selected using the email application is associated with a security policy; and
in response to determining that the resource is associated with the security policy;
activating a profile identified by the security policy, wherein the profile specifies that a secure application is permitted to access the resource referred to by the resource locator; and
accessing the resource referred to by the resource locator using the secure application instead of another application. - View Dependent Claims (15, 16, 17, 20)
- receiving, using an email application, a user selection of a resource locator rendered in a user interface for the email application, wherein the resource locator comprises a reference to a resource;
Specification