System and method for restricting access to email and attachments
First Claim
1. A method for restricting access to one or more email attachments, comprising:
- receiving an email addressed to a first recipient and including at least a first attachment;
processing the email to determine whether a valid authorization code is associated with the email, wherein the valid authorization code identifies an attachment as an authorized attachment; and
preventing access by the recipient to the first attachment if the processing of the email determined that no valid authorization code is associated with the email.
5 Assignments
0 Petitions
Accused Products
Abstract
One aspect of the invention is a method for restricting access to one or more email attachments includes receiving an email addressed to a first recipient and including at least a first attachment. The email is processed to determine whether a valid authorization code is associated with the email (and/or the attachment (s)). The valid authorization code identifies the email (and/or the attachment(s)) as an authorized communication. Access by the recipient to the first attachment is prevented if the processing of the email determined that no valid authorization code is associated with the email (and/or the attachment(s)).
69 Citations
30 Claims
-
1. A method for restricting access to one or more email attachments, comprising:
-
receiving an email addressed to a first recipient and including at least a first attachment;
processing the email to determine whether a valid authorization code is associated with the email, wherein the valid authorization code identifies an attachment as an authorized attachment; and
preventing access by the recipient to the first attachment if the processing of the email determined that no valid authorization code is associated with the email. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for restricting access to one or more unhealthy portions of an email, comprising:
-
a computer operable to receive an email addressed to a first recipient and including at least a first attachment; and
security software stored on the computer and operable to;
process the email to determine whether a valid authorization code is associated with the email, wherein the valid authorization code identifies an attachment as an authorized attachment; and
prevent access by the recipient to the first attachment if the processing of the email determined that no valid authorization code is associated with the email. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method for restricting access to an email, comprising:
-
receiving an email addressed to a first recipient;
processing the email to determine whether a valid authorization code is associated with the email, wherein the valid authorization code identifies the email as an authorized communication; and
preventing access by the recipient to the email if the processing of the email determined that no valid authorization code is associated with the email.
-
Specification