System and method for restricting access to email and attachments
First Claim
Patent Images
1. A method for restricting access to one or more email attachments, comprising:
- receiving an email addressed to a first recipient and including at least a first attachment;
processing the email to determine whether a valid authorization code is associated with the email, wherein the valid authorization code indicates that an attachment is safe to be opened or executed by the first recipient, and the processing includes;
searching for an authorization code; and
determining whether a found authorization code is valid;
preventing access by the recipient to the first attachment if the processing of the email determined that no valid authorization code is associated with the email; and
notifying a sender of the email that the email comprises an unauthorized attachment if the processing of the email determined that no valid authorization code is associated with the email.
5 Assignments
0 Petitions
Accused Products
Abstract
One aspect of the invention is a method for restricting access to one or more email attachments includes receiving an email addressed to a first recipient and including at least a first attachment. The email is processed to determine whether a valid authorization code is associated with the email (and/or the attachment (s)). The valid authorization code identifies the email (and/or the attachment(s)) as an authorized communication. Access by the recipient to the first attachment is prevented if the processing of the email determined that no valid authorization code is associated with the email (and/or the attachment(s)).
25 Citations
28 Claims
-
1. A method for restricting access to one or more email attachments, comprising:
-
receiving an email addressed to a first recipient and including at least a first attachment; processing the email to determine whether a valid authorization code is associated with the email, wherein the valid authorization code indicates that an attachment is safe to be opened or executed by the first recipient, and the processing includes; searching for an authorization code; and determining whether a found authorization code is valid; preventing access by the recipient to the first attachment if the processing of the email determined that no valid authorization code is associated with the email; and notifying a sender of the email that the email comprises an unauthorized attachment if the processing of the email determined that no valid authorization code is associated with the email. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for restricting access to one or more unhealthy portions of an email, comprising:
-
a computer operable to receive an email addressed to a first recipient and including at least a first attachment; and security software stored on the computer and operable to; process the email to determine whether a valid authorization code is associated with the email, wherein the valid authorization code indicates that an attachment is safe to be opened or executed by the first recipient, and the process includes; search for an authorization code; and determine whether a found authorization code is valid; prevent access by the recipient to the first attachment if the processing of the email determined that no valid authorization code is associated with the email; and notify a sender of the email that the email comprises an unauthorized attachment if, when processing the email, the security software determined that no valid authorization code is associated with the email. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for restricting access to one or more email attachments, comprising
receiving an email addressed to a first recipient and including at least a first attachment; -
processing the email to determine whether a valid authorization code is associated with the email, wherein the valid authorization code identifies an attachment as an authorized attachment; preventing access by the recipient to the first attachment if the processing of the email determined that no valid authorization code is associated with the email; and notifying a sender of the email that the first recipient did not receive a complete message if the processing of the email determined that no valid authorization code is associated with the email.
-
-
28. A method for restricting access to an email, comprising:
-
receiving an email addressed to a first recipient; processing the email to determine whether a valid authorization code is associated with the email, wherein the valid authorization code indicates that the email is safe to he opened or executed by the first recipient, and the processing includes; searching for an authorization code; and determining whether a found authorization code is valid; preventing access by the recipient to the email if the processing of the email determined that no valid authorization code is associated with the email; and wherein the preventing prevents the recipient from all possibility of accessing the email; and notifying a sender of the email that the email is an unauthorized email if the processing of the email determined that no valid authorization code is associated with the email.
-
Specification