Systems and methods for controlling email access
First Claim
Patent Images
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device to ensure security of email attachments, comprising code that:
- accesses an email sent to a client device from at least one email service, the email comprising an email attachment;
identifies a rule associated with the email, the rule specifying that the email attachment must be removed from the email prior to displaying the email to the recipient;
removes the email attachment from the email in accordance with the rule;
encrypts, without user interaction, the removed email attachment with a cryptographic key accessible to a secure container application, the secure container application being provided separately from an email application used to access the email;
generates an encrypted email attachment from the email attachment using the cryptographic key accessible to the secure container application; and
modifies the email to include the encrypted email attachment.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys.
-
Citations
20 Claims
-
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device to ensure security of email attachments, comprising code that:
-
accesses an email sent to a client device from at least one email service, the email comprising an email attachment; identifies a rule associated with the email, the rule specifying that the email attachment must be removed from the email prior to displaying the email to the recipient; removes the email attachment from the email in accordance with the rule; encrypts, without user interaction, the removed email attachment with a cryptographic key accessible to a secure container application, the secure container application being provided separately from an email application used to access the email; generates an encrypted email attachment from the email attachment using the cryptographic key accessible to the secure container application; and modifies the email to include the encrypted email attachment. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for ensuring security of email attachments, comprising:
-
accessing an email sent to a client device from at least one email service, the email comprising an email attachment; identifying a rule associated with the email, the rule specifying that the email attachment must be removed from the email prior to displaying the email to the recipient; removing the email attachment from the email in accordance with the rule; encrypting, without user interaction, the removed email attachment with a cryptographic key accessible to a secure container application, the secure container application being provided separately from an email application used to access the email; generating an encrypted email attachment from the email attachment using the cryptographic key accessible to the secure container application; and modifying the email to include the encrypted email attachment. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A system for ensuring security of email attachments, comprising:
-
a transmitting device comprising a processor and a memory configured to transmit an email; a receiving device comprising a processor and a memory configured to receive the email; an email delivery device that facilitates transmitting the email from the transmitting device to the receiving device, wherein the transmitting device, the receiving device, or the email delivery service; accesses an email sent to the receiving device, the email comprising an email attachment; identifies a rule associated with the email, the rule specifying that the email attachment must be removed from the email prior to displaying the email to the recipient; removes the email attachment from the email in accordance with the rule; encrypts, without user interaction, the removed email attachment with a cryptographic key accessible to a secure container application, the secure container application being provided separately from an email application used to access the email; generates an encrypted email attachment from the email attachment using the cryptographic key accessible to the secure container application; and modifies the email to include the encrypted email attachment. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification