IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0272224
(2014-05-07)
|
등록번호 |
US-9325713
(2016-04-26)
|
발명자
/ 주소 |
- Stuntebeck, Erich
- Dabbiere, David
|
출원인 / 주소 |
|
대리인 / 주소 |
Thomas | Horstemeyer, LLP
|
인용정보 |
피인용 횟수 :
0 인용 특허 :
115 |
초록
▼
Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least one resource rule associated with the email resources, and adding at least one URL to the email resources in accordance with the resource r
Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least one resource rule associated with the email resources, and adding at least one URL to the email resources in accordance with the resource rules.
대표청구항
▼
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device comprising at least one hardware processor, the program comprising code that, when executed by the at least one computing device, causes the at least one computing device to: access an email
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device comprising at least one hardware processor, the program comprising code that, when executed by the at least one computing device, causes the at least one computing device to: access an email resource requested by a client device from at least one email service;identify a resource rule specifying a condition for which the client device is authorized to access the email resource, the resource rule being identified based at least in part on a device state of the client device;determine whether the email resource satisfies the resource rule based at least in part on a stringency level associated with the resource rule, the stringency level being increased or reduced based at least in part on the device state;responsive to the email resource failing to satisfy the resource rule, modify the email resource causing the email resource to satisfy the resource rule; andresponsive to the email resource, as modified, satisfying the resource rule, authorize the client device to access the email resource. 2. The non-transitory computer-readable medium of claim 1, wherein the code that modifies the email resource to satisfy the resource rule further comprises code that formats the email resource from a current format of the email resource into hypertext markup language (HTML) format, rich text format, or plain text format. 3. The non-transitory computer-readable medium of claim 1, wherein the code that modifies the email resource to satisfy the resource rule further comprises code that encodes the email resource using advanced encryption standard (AES) or data encryption standard (DES). 4. The non-transitory computer-readable medium of claim 1, wherein the code that modifies the email resource to satisfy the resource rule further comprises code that configures the email resource to be exclusively accessible via at least one secure container application executable by the client device. 5. The non-transitory computer-readable medium of claim 1, wherein the code that modifies the email resource to satisfy the resource rule further comprises code that: removes an attachment associated with the email resource;encrypts the attachment based at least in part on a cryptographic key; andmakes the attachment as encrypted available via a client application executable by the client device. 6. The non-transitory computer-readable medium of claim 1, wherein the code that modifies the email resource to satisfy the resource rule further comprises code that removes a digital image from a body of the email resource and attaches the digital image as an attachment to the email resource. 7. The non-transitory computer-readable medium of claim 1, wherein the code that modifies the email resource to satisfy the resource rule further comprises code that: flags the email resource as having been modified; andattaches an indication to the email resource that provides information associated with a modification of the email resource. 8. The non-transitory computer-readable medium of claim 1, wherein the code that authorizes the client device to access the email resource further comprises code that: transmits the email resource to the client device responsive to modifying the email resource to satisfy the resource rule;makes the email resource available for a download by the client device; ortransmits the email resource to the client device upon receiving a request to download the email resource from the client device. 9. The non-transitory computer-readable medium of claim 1, wherein the device state further comprises information associated with a current time associated with the client device, at least one network accessible by the client device, or at least one network beacon accessible by the client device. 10. The non-transitory computer-readable medium of claim 1, wherein the device state further comprises information associated with a hardware feature of the client device, a software feature of the client device, or an application accessible by the client device. 11. The non-transitory computer-readable medium of claim 1, wherein the resource rule further comprises a variably stringent resource rule, wherein a stringency of the variably stringent resource rule is based at least in part on the device state associated with the client device. 12. A system, comprising: a first computing device comprising at least one hardware processor; andprogram code executed in the first computing device that causes the first computing device to at least: proxy a second computing device to access an email resource requested by a client device from an email service;identify a resource rule specifying a condition for which the client device is authorized to access the email resource, the resource rule being identified based at least in part on a device state associated with the client device;determine whether the email resource satisfies the resource rule based at least in part on a stringency level associated with the resource rule, the stringency level being increased or reduced based at least in part on the device state;responsive to the email resource failing to satisfy the resource rule, modify the email resource to satisfy the resource rule; andresponsive to the email resource satisfying the resource rule, authorize the client device to access the email resource. 13. The system of claim 12, wherein the program code that causes the first computing device to modify the email resource to satisfy the resource rule further comprises program code that causes the first computing device to add at least one uniform resource locator (URL) to the email resource responsive to the at least one URL being required by the resource rule. 14. The system of claim 12, wherein the program code that causes the first computing device to modify the email resource to satisfy the resource rule further comprises program code that causes the first computing device to encode the email resource using advanced encryption standard (AES) or data encryption standard (DES). 15. The system of claim 12, wherein the program code that causes the first computing device to modify the email resource to satisfy the resource rule further comprises program code that causes the first computing device to configure the email resource to be exclusively accessible via at least one secure container application executable by the client device. 16. The system of claim 12, wherein the program code that causes the first computing device to modify the email resource to satisfy the resource rule further comprises program code that causes the first computing device to at least: remove an attachment associated with the email resource;encrypt the attachment based at least in part on a cryptographic key; andmake the attachment as encrypted available via a client application executable by the client device. 17. The system of claim 12, wherein the program code that causes the first computing device to modify the email resource to satisfy the resource rule further comprises program code that causes the first computing device to remove a digital image from a body of the email resource and attaches the digital image as an attachment to the email resource. 18. The system of claim 12, wherein the program code that causes the first computing device to modify the email resource to satisfy the resource rule further comprises program code that causes the first computing device to at least: flag the email resource as having been modified; andattach an indication to the email resource that provides information associated with a modification of the email resource. 19. The system of claim 12, wherein the device state further comprises information associated with a current time associated with the client device, at least one network accessible by the client device, or at least one network beacon accessible by the client device. 20. The system of claim 12, wherein the device state further comprises information associated with a hardware feature of the client device, a software feature of the client device, or an application accessible by the client device. 21. The system of claim 12, wherein the resource rule further comprises a variably stringent resource rule, wherein a stringency of the variably stringent resource rule is based at least in part on the device state associated with the client device. 22. A method, comprising: accessing, by a first computing device comprising at least one hardware processor, an email resource from a second computing device, the email resource being requested by a client device from an email service;identifying, by the first computing device, a resource rule specifying a condition for which the client device is authorized to access the email resource, the resource rule being identified based at least in part on a device state associated with the client device;determining, by the first computing device, whether the email resource satisfies the resource rule based at least in part on a stringency level associated with the resource rule, the stringency level being increased or reduced based at least in part on the device state;responsive to the email resource failing to satisfy the resource rule, modifying, by the first computing device, the email resource to satisfy the resource rule; andresponsive to the email resource satisfying the resource rule, authorizing, by the first computing device, the client device to access the email resource. 23. The method of claim 22, wherein modifying the email resource to satisfy the resource rule further comprises adding, by the first computing device, at least one uniform resource locator (URL) to the email resource responsive to the at least one URL being required by the resource rule. 24. The method of claim 22, wherein modifying the email resource to satisfy the resource rule further comprises encoding, by the first computing device, the email resource using advanced encryption standard (AES) or data encryption standard (DES). 25. The method of claim 22, wherein modifying the email resource to satisfy the resource rule further comprises configuring, by the first computing device, the email resource to be exclusively accessible via at least one secure container application executable by the client device. 26. The method of claim 22, wherein modifying the email resource to satisfy the resource rule further comprises: removing, by the first computing device, an attachment associated with the email resource;encrypting, by the first computing device, the attachment based at least in part on a cryptographic key; andmaking, by the first computing device, the attachment as encrypted available via a client application executable by the client device. 27. The method of claim 22, wherein modifying the email resource to satisfy the resource rule further comprises removing, by the first computing device, a digital image from a body of the email resource and attaching, by the first computing device, the digital image as an attachment to the email resource. 28. The method of claim 22, wherein modifying the email resource to satisfy the resource rule further comprises: flagging, by the first computing device, the email resource as having been modified; andattaching, by the first computing device, an indication to the email resource that provides information associated with a modification of the email resource. 29. The method of claim 22, wherein the device state further comprises information associated with a current time associated with the client device, at least one network accessible by the client device, or at least one network beacon accessible by the client device. 30. The method of claim 22, wherein the device state further comprises information associated with a hardware feature of the client device, a software feature of the client device, or an application accessible by the client device. 31. The method of claim 22, wherein the resource rule further comprises a variably stringent resource rule, wherein a stringency of the variably stringent resource rule is based at least in part on the device state associated with the client device.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.