Systems and methods for controlling email access
First Claim
Patent Images
1. A system, comprising:
- a client device;
at least one email service; and
,at least one memory device that stores computer-executable instructions that, when executed by at least one processor, cause the at least one processor to perform operations comprising;
proxying at least one email resource from the at least one email service to the client device;
determining whether the at least one email resource is accessible using at least one unauthorized application on the client device, the at least one unauthorized application comprising a native mail application bundled with the client device; and
responsive to a determination that the at least one email resource is accessible using the at least one unauthorized application, modifying the at least one email resource to be inaccessible using the at least one unauthorized application on the client device.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, determining whether the email resources are accessible to the client devices via at least one unauthorized application on the client devices, and modifying the email resources to be inaccessible via the unauthorized applications on the client devices in response to a determination that the email resources are accessible via the unauthorized applications on the client devices.
193 Citations
30 Claims
-
1. A system, comprising:
-
a client device; at least one email service; and
,at least one memory device that stores computer-executable instructions that, when executed by at least one processor, cause the at least one processor to perform operations comprising; proxying at least one email resource from the at least one email service to the client device; determining whether the at least one email resource is accessible using at least one unauthorized application on the client device, the at least one unauthorized application comprising a native mail application bundled with the client device; and responsive to a determination that the at least one email resource is accessible using the at least one unauthorized application, modifying the at least one email resource to be inaccessible using the at least one unauthorized application on the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising the steps of:
-
identifying at least one email resource on a client device; determining whether the at least one email resource is accessible using at least one unauthorized application on the client device, the at least one unauthorized application comprising a native mail application bundled with the client device; and responsive to a determination that the at least one email resource is accessible using the at least one unauthorized application, modifying the at least one email resource to be inaccessible using the at least one unauthorized application on the client device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium embodying code executable in a client device, the code, which when executed, causes the client device to perform a method comprising the steps of:
-
identifying at least one email resource; determining whether the at least one email resource is accessible using at least one unauthorized application on the client device, the at least one unauthorized application comprising a native mail application bundled with the client device; and responsive to a determination that the at least one email resource is accessible using the at least one unauthorized application on the client device, modifying the at least one email resource to be inaccessible using the at least one unauthorized application on the client device. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification