Systems and methods for controlling email access
First Claim
Patent Images
1. A method, comprising:
- identifying a plurality of email resources associated with a client device;
identifying at least one resource rule that specifies that the client device is only authorized to access the email resources when a portion of individual ones of the email resources is configured for exclusive access by a secure container application executable by the client device, wherein the secure container application is configured to prevent performance of at least one of;
a cut function, a copy function, and a screen capture function on the client device;
determining that the email resources do not satisfy the at least one resource rule;
in response to the email resources not satisfying the at least one resource rule;
causing the portion of the individual ones of the email resources to be configured for exclusive access by the secure container application by encrypting the portion of the individual ones of the email resources using a cryptographic key;
identifying a request by the secure container application executable by the client device to access an encrypted portion of at least one of the email resources;
providing the cryptographic key to the secure container application on the client device; and
providing the encrypted portion of the at least one of the email resources to the client device for access by the secure container application.
3 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are various examples for providing secure access to email resources. Email resources associated with client devices may be identified, and resource rules associated with the email resources may be identified. A determination of whether the email resources satisfy the resource rules may be made. If the email resources do not satisfy the resource rules, the email resources may be modified based at least in part on the resource rules
-
Citations
20 Claims
-
1. A method, comprising:
-
identifying a plurality of email resources associated with a client device; identifying at least one resource rule that specifies that the client device is only authorized to access the email resources when a portion of individual ones of the email resources is configured for exclusive access by a secure container application executable by the client device, wherein the secure container application is configured to prevent performance of at least one of;
a cut function, a copy function, and a screen capture function on the client device;determining that the email resources do not satisfy the at least one resource rule; in response to the email resources not satisfying the at least one resource rule; causing the portion of the individual ones of the email resources to be configured for exclusive access by the secure container application by encrypting the portion of the individual ones of the email resources using a cryptographic key; identifying a request by the secure container application executable by the client device to access an encrypted portion of at least one of the email resources; providing the cryptographic key to the secure container application on the client device; and providing the encrypted portion of the at least one of the email resources to the client device for access by the secure container application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium embodying program code executable by at least one computing device that, when executed, causes the at least one computing device to:
-
access at least one email resource associated with a client device; identify at least one resource rule that specifies that the client device is only authorized to access the at least one email resource when a predetermined portion of the at least one email resource is configured for exclusive access by a secure container application executable by the client device, wherein the secure container application is configured to prevent performance of at least one of;
a cut function, a copy function, and a screen capture function on the client device;determine that the at least one email resource does not satisfy the at least one resource rule; and in response to the at least one email resource not satisfying the at least one resource rule; causing the predetermined portion of the at least one email resource to be configured for exclusive access by the secure container application by encrypting the predetermined portion of the at least one email resource using a cryptographic key; identify a request by the particular secure container application executable by the client device to access the predetermined portion of the at least one email resource; and send the cryptographic key to the client device for access by the secure container application; and provide the encrypted portion of the at least one of the email resources to the client device for access by the secure container application. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system, comprising:
-
at least one computing device comprising at least one hardware processor; and memory comprising program instructions that, when executed by the at least one hardware processor, cause the at least one computing device to; identify a plurality of email resources accessible to a client device associated with a user account; identify at least one resource rule that specifies that the client device is only authorized to access the email resources in response to a predetermined portion of individual ones of the email resources being configured for exclusive access by a secure container application executable by the client device, wherein the secure container application is configured to prevent performance of a screen capture function on the client device when executed; determine that the email resources do not satisfy the at least one resource rule; in response to the email resources not satisfying the at least one resource rule; causing the predetermined portion of the individual ones of the email resources to be configured for exclusive access by the secure container application by encrypting the predetermined portion of the individual ones of the email resources using at least one cryptographic key; identify a request by the secure container application to access the predetermined portion of at least one of the email resources; send the at least one cryptographic key to the client device for access by the secure container application; and provide the encrypted portion of the at least one of the email resources to the client device for access by the secure container application. - View Dependent Claims (18, 19, 20)
-
Specification