Systems and methods for controlling email access
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-007/04
G06F-021/60
H04L-029/08
H04W-004/02
H04L-029/06
출원번호
US-0706499
(2012-12-06)
등록번호
US-8978110
(2015-03-10)
발명자
/ 주소
Dabbiere, Alan
Stuntebeck, Erich
Brannon, Jonathan Blake
출원인 / 주소
AirWatch LLC
대리인 / 주소
AirWatch LLC
인용정보
피인용 횟수 :
14인용 특허 :
115
초록▼
Embodiments of the disclosure relate to identifying email resources associated with client devices, identifying resource rules, determining whether the email resources satisfy the resource rules, and modifying the email resources as well as the ability to access the email resources based on the reso
Embodiments of the disclosure relate to identifying email resources associated with client devices, identifying resource rules, determining whether the email resources satisfy the resource rules, and modifying the email resources as well as the ability to access the email resources based on the resource rules if the resource rules are not satisfied by the email resources.
대표청구항▼
1. A system, comprising: one or more processors;one or more memory devices including instructions, which when executed, cause the processor to perform a method comprising the steps of:identifying one or more email resources associated with a client device;identifying one or more resource rules, the
1. A system, comprising: one or more processors;one or more memory devices including instructions, which when executed, cause the processor to perform a method comprising the steps of:identifying one or more email resources associated with a client device;identifying one or more resource rules, the one or more resource rules being associated with a plurality of stringency levels;selecting a stringency level from the plurality of stringency levels based at least in part upon whether the client device is within a transmission range of at least one of a network beacon or a particular network, wherein a reduced stringency level is selected in response to a determination that the client device is within the transmission range and an increased stringency level is selected in response to a determination that the client device is outside the transmission range;determining whether the email resources satisfy the one or more resource rules according to the selected one of the stringency levels; andresponsive to a determination that the email resources do not satisfy the resource rules according to the selected one of the stringency levels, modifying the email resources based at least in part on the resource rules. 2. The system of claim 1, wherein the memory devices further include instructions, which when executed, cause the processor to perform a method further comprising the step of: responsive to a determination that the email resources satisfy the resource rules, authorizing the client device to access the email resources. 3. The system of claim 1, wherein the memory devices further include instructions, which when executed, cause the processor to perform a method further comprising the step of: responsive to a determination that the email resources satisfy the resource rules, authorizing a plurality of client devices and a corresponding plurality of users to access the email resources. 4. The system of claim 1, wherein the resource rules comprise one or more of format rules, content rules, attachment rules, or access rules. 5. The system of claim 1, wherein modifying the email resources comprises one or more of removing at least one attachment from the email resources or removing at least a portion of text from the email resources based at least upon the selected one of the stringency levels. 6. The system of claim 1, wherein modifying the email resources comprises configuring one or more portions of the email resources to be exclusively accessible via one or more client side applications on the client devices. 7. The system of claim 6, wherein the client side applications are configured to enforce one or more of printing restrictions, screen capture restrictions, transmission restrictions, cutting restrictions, copying restrictions, or pasting restrictions in response to selection of the increased stringency level. 8. The system of claim 1, wherein the increased stringency level is selected based at least in part upon another state of the client device. 9. A non-transitory computer-readable medium embodying a program executable in a computing device, the program comprising code, which when executed, causes the computing device to perform a method comprising the steps of: receiving, on a client device, one or more email resources;identifying one or more resource rules, the one or more resource rules being associated with a plurality of stringency levels;selecting a stringency level from the plurality of stringency levels based at least in part upon whether the client device is within a transmission range of at least one of a network beacon or a particular network, wherein a reduced stringency level is selected in response to a determination that the client device is within the transmission range and an increased stringency level is selected in response to a determination that the client device is outside the transmission range;determining whether the email resources satisfy the one or more resource rules according to the selected one of the stringency levels; andresponsive to a determination that the email resources do not satisfy the one or more resource rules, modifying the email resources based at least in part on the selected one of the stringency levels and the one or more resource rules. 10. The computer-readable medium of claim 9, wherein the program further comprises code, which when executed, causes the computing device to perform a method further comprising the step of: responsive to a determination that the email resources satisfy the resource rules, authorizing the client device to access the email resources. 11. The computer-readable medium of claim 9, wherein the program further comprises code, which when executed, causes the computing device to perform a method further comprising the step of: responsive to a determination that the email resources satisfy the resource rules, authorizing a plurality of client devices and a corresponding plurality of users to access the email resources. 12. The computer-readable medium of claim 9, wherein the resource rules comprise one or more of format rules, content rules, attachment rules, or access rules. 13. The computer-readable medium of claim 9, wherein modifying the email resources comprises one or more of removing at least one attachment from the email resources or removing at least a portion of text from the email resources based at least upon the selected one of the stringency levels. 14. The computer-readable medium of claim 9, wherein modifying the email resources comprises configuring one or more portions of the email resources to be exclusively accessible via one or more client side applications. 15. The computer-readable medium of claim 14, wherein the client side applications are configured to enforce one or more of printing restrictions, screen capture restrictions, transmission restrictions, cutting restrictions, copying restrictions, or pasting restrictions in response to selection of the increased stringency level. 16. The computer-readable medium of claim 9, wherein the increased stringency level is selected based at least in part upon another state of the client device. 17. A method comprising the steps of: identifying one or more email resources stored on a client device;identifying one or more resource rules, the one or more resource rules being associated with a plurality of stringency levels;selecting a stringency level from the plurality of stringency levels based at least in part upon whether the client device is within a transmission range of at least one of a network beacon or a particular network, wherein a reduced stringency level is selected in response to a determination that the client device is within the transmission range and an increased stringency level is selected in response to a determination that the client device is outside the transmission range;determining whether the email resources satisfy the one or more resource rules according to the selected one of the stringency levels; andresponsive to a determination that the email resources do not satisfy the one or more resource rules, modifying the email resources based at least in part on the selected one of the stringency levels and the one or more resource rules. 18. The method of claim 17, further comprising the steps of: authorizing the client device to access the email resources associated with the client devices. 19. The method of claim 17, wherein the resource rules comprise one or more of format rules, content rules, attachment rules, or access rules. 20. The method of claim 17, wherein modifying the email resources comprises one or more of removing at least one attachment from the email resources or removing at least a portion of text from the email resources based at least upon the selected one of the stringency levels. 21. The method of claim 17, wherein modifying the email resources comprises configuring one or more portions of the email resources to be exclusively accessible via one or more client side applications. 22. The method of claim 21, wherein the client side applications are configured to enforce one or more of printing restrictions, screen capture restrictions, transmission restrictions, cutting restrictions, copying restrictions, or pasting restrictions in response to selection of the increased stringency level. 23. The method of claim 21, wherein the increased stringency level is selected based at least in part upon another state of client device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (115)
Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Shai Mohaban ; Itzhak Parnafes ; Yoram Ramberg IL; Yoram Snir IL; John Strassner, Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Farris Robert D. ; Flaherty Stephen J. ; Goodman William D., Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java.
Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
Wittstein Alan D. (Westport CT) Ciocca Giacomo A. (Thomaston CT), Mobile telephone device for storing a plurality of changable charge rates and time limit data.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Phillips John C. ; Hayes ; Jr. John J., Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Clark Ted H. ; Malisewski Steven C. ; Cooper Patrick R. ; Crosswy William Caldwell ; Crochet Larry J., System for automatic synchronization of common file between portable computer and host computer via communication channe.
Nagamatsu Jun (Kawasaki JPX) Terashima Masaki (Yokohama JPX) Yamada Jun (Yokohama JPX), System for preventing unauthorized use of a micro cellular system operating in coexistence with a cellular system.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
Wade, Christopher Michael; Tan, Danilo; Brown, John R.; Krzyzanowski, Paul; Gittleman, Daniel; Dare, Robert M, System and method for creating secure applications.
Wade, Christopher Michael; Tan, Danilo; Brown, John R.; Krzyzanowski, Paul; Gittleman, Daniel; Dare, Robert M., System and method for creating secure applications.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.