Systems and methods for controlling email access
First Claim
Patent Images
1. A system, comprising:
- one or more processors;
one or more memory devices including instructions, which when executed, cause the processor to perform a method comprising the steps of;
identifying one or more email resources associated with a client device;
identifying one or more resource rules, the one or more resource rules being associated with a plurality of stringency levels;
selecting a stringency level from the plurality of stringency levels based at least in part upon whether the client device is within a transmission range of at least one of a network beacon or a particular network, wherein a reduced stringency level is selected in response to a determination that the client device is within the transmission range and an increased stringency level is selected in response to a determination that the client device is outside the transmission range;
determining whether the email resources satisfy the one or more resource rules according to the selected one of the stringency levels; and
responsive to a determination that the email resources do not satisfy the resource rules according to the selected one of the stringency levels, modifying the email resources based at least in part on the resource rules.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the disclosure relate to identifying email resources associated with client devices, identifying resource rules, determining whether the email resources satisfy the resource rules, and modifying the email resources as well as the ability to access the email resources based on the resource rules if the resource rules are not satisfied by the email resources.
231 Citations
23 Claims
-
1. A system, comprising:
-
one or more processors; one or more memory devices including instructions, which when executed, cause the processor to perform a method comprising the steps of; identifying one or more email resources associated with a client device; identifying one or more resource rules, the one or more resource rules being associated with a plurality of stringency levels; selecting a stringency level from the plurality of stringency levels based at least in part upon whether the client device is within a transmission range of at least one of a network beacon or a particular network, wherein a reduced stringency level is selected in response to a determination that the client device is within the transmission range and an increased stringency level is selected in response to a determination that the client device is outside the transmission range; determining whether the email resources satisfy the one or more resource rules according to the selected one of the stringency levels; and responsive to a determination that the email resources do not satisfy the resource rules according to the selected one of the stringency levels, modifying the email resources based at least in part on the resource rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium embodying a program executable in a computing device, the program comprising code, which when executed, causes the computing device to perform a method comprising the steps of:
-
receiving, on a client device, one or more email resources; identifying one or more resource rules, the one or more resource rules being associated with a plurality of stringency levels; selecting a stringency level from the plurality of stringency levels based at least in part upon whether the client device is within a transmission range of at least one of a network beacon or a particular network, wherein a reduced stringency level is selected in response to a determination that the client device is within the transmission range and an increased stringency level is selected in response to a determination that the client device is outside the transmission range; determining whether the email resources satisfy the one or more resource rules according to the selected one of the stringency levels; and responsive to a determination that the email resources do not satisfy the one or more resource rules, modifying the email resources based at least in part on the selected one of the stringency levels and the one or more resource rules. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method comprising the steps of:
-
identifying one or more email resources stored on a client device; identifying one or more resource rules, the one or more resource rules being associated with a plurality of stringency levels; selecting a stringency level from the plurality of stringency levels based at least in part upon whether the client device is within a transmission range of at least one of a network beacon or a particular network, wherein a reduced stringency level is selected in response to a determination that the client device is within the transmission range and an increased stringency level is selected in response to a determination that the client device is outside the transmission range; determining whether the email resources satisfy the one or more resource rules according to the selected one of the stringency levels; and responsive to a determination that the email resources do not satisfy the one or more resource rules, modifying the email resources based at least in part on the selected one of the stringency levels and the one or more resource rules. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification