Systems and methods for controlling email access
First Claim
Patent Images
1. A method for managing access to content by an access control server that determines whether a client can access e-mail provided by an email server, comprising:
- obtaining content for transmission to a client, the content comprising an e-mail message and an attachment to the e-mail message;
determining that access to the content should be restricted to an authorized email client installed on the client;
encrypting the attachment to the e-mail message;
transmitting the attachment to the client; and
transmitting at least one instruction to the authorized email client installed on the client, the at least one instruction including a key for decrypting the attachment, wherein the key for decrypting the attachment is inaccessible to a native email client installed on the client.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, determining whether the email resources are accessible to the client devices via at least one unauthorized application on the client devices, and modifying the email resources to be inaccessible via the unauthorized applications on the client devices in response to a determination that the email resources are accessible via the unauthorized applications on the client devices.
233 Citations
13 Claims
-
1. A method for managing access to content by an access control server that determines whether a client can access e-mail provided by an email server, comprising:
-
obtaining content for transmission to a client, the content comprising an e-mail message and an attachment to the e-mail message; determining that access to the content should be restricted to an authorized email client installed on the client; encrypting the attachment to the e-mail message; transmitting the attachment to the client; and transmitting at least one instruction to the authorized email client installed on the client, the at least one instruction including a key for decrypting the attachment, wherein the key for decrypting the attachment is inaccessible to a native email client installed on the client. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer-readable medium comprising instructions which, when executed by a processor:
-
obtain content for transmission to a client, the content comprising an e-mail message and an attachment to the e-mail message; determine that access to the content should be restricted to an authorized email client installed on the client; encrypt the attachment to the e-mail message; transmit the attachment to the client; and transmit at least one instruction to the authorized email client installed on the client, the at least one instruction including a key for decrypting the attachment, wherein the key for decrypting the attachment is inaccessible to a native email client installed on the client. - View Dependent Claims (7, 8, 9, 10)
-
-
11. An access control server that manages access to content, the access control server executing an application that is configured to at least:
-
obtain content for transmission to a client, the content comprising an e-mail message and an attachment to the e-mail message; determine that access to the content should be restricted to an authorized email client installed on the client; encrypt the attachment to the e-mail message; transmit the attachment to the client; and transmit at least one instruction to the authorized email client installed on the client, the at least one instruction including a key for decrypting the attachment, wherein the key for decrypting the attachment is inaccessible to a native email client installed on the client. - View Dependent Claims (12, 13)
-
Specification