Systems and Methods for Controlling Email Access
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys.
0 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A method for controlling access to email attachments, comprising:
-
providing a graphical user interface (GUI) that enables selection of at least one rule to govern email access for a plurality of users; receiving, through the GUI, a selection of an encryption rule that requires encrypting at least one attachment to an email; and enforcing the selected encryption rule by encrypting the at least one email attachment, without interaction by a user sending the email. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A non-transitory, computer-readable medium embodying a program executable in at least one computing device, comprising code that, when executed by the computing device, performs stages for controlling access to email attachments, the stages comprising:
-
providing a graphical user interface (GUI) that enables selection of at least one rule to govern email access for a plurality of users; receiving, through the GUI, a selection of a removal rule that requires encrypting at least one attachment to an email; and enforcing the selected encryption rule by encrypting the at least one email attachment, without interaction by a user sending the email. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
-
35. A system for controlling access to email attachments, comprising:
-
a processor that generates a graphical user interface (GUI) that enables selection of at least one rule to govern email access for a plurality of users; and an access control server communicatively coupled to the processor and configured to receive selections provided through the GUI, wherein the GUI receives a selection of an encryption rule that requires encrypting at least one attachment to an email, and wherein the access control server enforces the selected encryption rules by encrypting the at least one email attachment, without interaction by a user sending the email. - View Dependent Claims (36, 37, 38, 39, 40)
-
Specification