Systems and methods for controlling email access
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-012/12
H04L-029/06
출원번호
US-0740606
(2013-01-14)
등록번호
US-8832785
(2014-09-09)
발명자
/ 주소
Stuntebeck, Erich
Dabbiere, David
출원인 / 주소
Stuntebeck, Erich
인용정보
피인용 횟수 :
0인용 특허 :
114
초록▼
Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least one resource rule associated with the email resources, and adding at least one URL to the email resources in accordance with the resource r
Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least one resource rule associated with the email resources, and adding at least one URL to the email resources in accordance with the resource rules.
대표청구항▼
1. A system, comprising: an apparatus comprising at least one processor and at least one memory storing program code instructions, the at least one memory and program code instructions being configured to, with the at least one processor, cause the apparatus to at least: identify, via at least one p
1. A system, comprising: an apparatus comprising at least one processor and at least one memory storing program code instructions, the at least one memory and program code instructions being configured to, with the at least one processor, cause the apparatus to at least: identify, via at least one processor, at least one resource rule associated with a particular client device, wherein at least one email resource is accessible to the particular client device, wherein the at least one resource rule is identified based at least in part on a device state associated with the particular client device, and wherein the particular client device may only be authorized to access the at least one email resource in an instance in which at least a threshold of the at least one resource rule is satisfied;determine whether at least one of the identified at least one resource rule comprises a resource rule specifying that the particular client device may only be authorized to access the at least one email resource in an instance in which the at least one email resource comprises at least one particular uniform resource locator (URL); and,in an instance in which it is determined that at least one of the identified at least one resource rule comprises the resource rule specifying that the at least one particular client device may only be authorized to access the at least one email resource in an instance in which the at least one email resource comprises the at least one particular URL: determine whether the at least one email resource comprises the at least one particular URL; and,in an instance in which it is determined that the at least one email resource does not comprise the at least one particular URL, add the at least one particular URL to the at least one email resource. 2. The system of claim 1, wherein the at least one particular URL comprises a URL that provides access to a website related to at least one of the following: an enterprise policy, a privacy policy, a confidentiality policy, or an attorney-client privilege. 3. The system of claim 1, wherein the at least one particular URL comprises at least one URL that is configured to be exclusively accessible via a particular browser application. 4. The system of claim 1, wherein the at least one particular URL comprises at least one URL that is digitally signed. 5. The system of claim 1, wherein the at least one particular URL comprises at least one URL that is encrypted. 6. The system of claim 1, wherein the apparatus is further caused to at least: transmit the at least one email resource to the particular client device. 7. The system of claim 1, wherein the apparatus is further caused to at least: authorize the particular client device to access the at least one email resource. 8. A method, comprising: identifying, via at least one processor, at least one resource rule associated with a particular client device, wherein at least one email resource is accessible to the particular client device, wherein the at least one resource rule is identified based at least in part on a device state associated with the particular client device, and wherein the particular client device may only be authorized to access the at least one email resource in an instance in which at least a threshold of the at least one resource rule is satisfied;determining whether at least one of the identified at least one resource rule comprises a resource rule specifying that the particular client device may only be authorized to access the at least one email resource in an instance in which the at least one email resource comprises at least one particular uniform resource locator (URL); and,in an instance in which it is determined that at least one of the identified at least one resource rule comprises the resource rule specifying that the at least one particular client device may only be authorized to access the at least one email resource in an instance in which the at least one email resource comprises the at least one particular URL: determining whether the at least one email resource comprises the at least one particular URL; and,in an instance in which it is determined that the at least one email resource does not comprise the at least one particular URL, adding the at least one particular URL to the at least one email resource. 9. The method of claim 8, wherein the at least one particular URL comprises at least one URL that provides access to a website related to at least one of the following: an enterprise policy, a privacy policy, a confidentiality policy, or an attorney-client privilege. 10. The method of claim 8, wherein the at least one particular URL comprises at least one URL that is configured to be exclusively accessible via a particular browser application. 11. The method of claim 8, wherein the at least one particular URL comprises at least one URL that is digitally signed. 12. The method of claim 8, wherein the at least one particular URL comprises at least one URL that is encrypted. 13. The method of claim 8, further comprising: authorizing the particular client device to access the at least one email resource. 14. A computer program product comprising a non-transitory computer-readable storage medium having program code portions embodied therein, the program code portions being configured to, upon execution by a processor, cause apparatus to at least: identify, via at least one processor, at least one resource rule associated with a particular client device, wherein at least one email resource is accessible to the particular client device, wherein the at least one resource rule is identified based at least in part on a device state associated with the particular client device, and wherein the particular client device may only be authorized to access the at least one email resource in an instance in which at least a threshold of the at least one resource rule is satisfied;determine whether at least one of the identified at least one resource rule comprises a resource rule specifying that the particular client device may only be authorized to access the at least one email resource in an instance in which the at least one email resource comprises at least one particular uniform resource locator (URL); and,in an instance in which it is determined that at least one of the identified at least one resource rule comprises the resource rule specifying that the at least one particular client device may only be authorized to access the at least one email resource in an instance in which the at least one email resource comprises the at least one particular URL: determine whether the at least one email resource comprises the at least one particular URL; and,in an instance in which it is determined that the at least one email resource does not comprise the at least one particular URL, add the at least one particular URL to the at least one email resource. 15. The computer program product of claim 14, wherein the at least one particular URL comprises at least one URL that provides access to a website related to at least one of the following: an enterprise policy, a privacy policy, a confidentiality policy, or an attorney-client privilege. 16. The computer program product of claim 14, wherein the at least one particular URL comprises at least one URL that is configured to be exclusively accessible via a particular browser application. 17. The computer program product of claim 14, wherein the at least one particular URL comprises at least one URL that is digitally signed. 18. The computer program product of claim 14, wherein the at least one particular URL comprises at least one URL that is encrypted. 19. The computer program product of claim 14, wherein the apparatus is further caused to at least: authorize the particular client device to access the at least one email resource. 20. A method, comprising: identifying, via at least one processor, at least one resource rule associated with a particular client device, wherein at least one email resource is accessible to the particular client device, wherein the at least one resource rule is identified based at least in part on a device state associated with the particular client device, and wherein the particular client device may only be authorized to access the at least one email resource in an instance in which at least a threshold of the at least one resource rule is satisfied;determining whether at least one of the identified at least one resource rule comprises a resource rule specifying that the particular client device may only be authorized to access the at least one email resource in an instance in which the at least one email resource comprises at least one particular email resource component; and,in an instance in which it is determined that at least one of the identified at least one resource rule comprises the resource rule specifying that the at least one particular client device may only be authorized to access the at least one email resource in an instance in which the at least one email resource comprises the at least one particular email resource component: determining whether the at least one email resource comprises the at least one particular email resource component; and,in an instance in which it is determined that the at least one email resource does not comprise the at least one particular email resource component, adding the at least one particular email resource component to the at least one email resource. 21. The method of claim 20, wherein the at least one particular email resource component comprises at least one of the following: at least one file attachment, text, or at least one Uniform Resource Locator (URL). 22. The method of claim 20, wherein the at least one particular email resource component comprises at least one email resource component that is related to at least one of the following: an enterprise policy, a privacy policy, a confidentiality policy, or an attorney-client privilege. 23. The method of claim 20, wherein the at least one particular email resource component comprises at least one email resource component that is configured to be exclusively accessible via a particular browser application. 24. The method of claim 20, wherein the at least one particular email resource component comprises at least one email resource component that is digitally signed. 25. The method of claim 20, wherein the at least one particular email resource component comprises at least one email resource component that is encrypted. 26. The method of claim 20, further comprising: authorizing the particular client device to access the at least one email resource.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (114)
Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Shai Mohaban ; Itzhak Parnafes ; Yoram Ramberg IL; Yoram Snir IL; John Strassner, Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Farris Robert D. ; Flaherty Stephen J. ; Goodman William D., Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java.
Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
Wittstein Alan D. (Westport CT) Ciocca Giacomo A. (Thomaston CT), Mobile telephone device for storing a plurality of changable charge rates and time limit data.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Phillips John C. ; Hayes ; Jr. John J., Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Clark Ted H. ; Malisewski Steven C. ; Cooper Patrick R. ; Crosswy William Caldwell ; Crochet Larry J., System for automatic synchronization of common file between portable computer and host computer via communication channe.
Nagamatsu Jun (Kawasaki JPX) Terashima Masaki (Yokohama JPX) Yamada Jun (Yokohama JPX), System for preventing unauthorized use of a micro cellular system operating in coexistence with a cellular system.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.