Systems and methods for controlling email access
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-007/04
H04L-029/06
H04L-012/58
G06F-021/62
출원번호
US-0272036
(2014-05-07)
등록번호
US-9391960
(2016-07-12)
발명자
/ 주소
Dabbiere, Alan
Stuntebeck, Erich
Brannon, Jonathan Blake
출원인 / 주소
AirWatch LLC
인용정보
피인용 횟수 :
0인용 특허 :
116
초록
Embodiments of the disclosure relate to proxying at least one email resource in transit to at least one client device from at least one email service, removing at least one URL from the email resources, and adding at least one modified URL to the email resources.
대표청구항▼
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, comprising program code that, when executed, causes the at least one computing device to: access an email resource requested by a client device from at least one email service;identify a uni
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, comprising program code that, when executed, causes the at least one computing device to: access an email resource requested by a client device from at least one email service;identify a uniform resource locator (URL) within the email resource;determine whether the URL is required to be accessed by a particular browser application; andresponsive to determining that the URL is required to be accessed by the particular browser application, modify the URL within the email resource to include a designation of the particular browser application, wherein the URL as modified cannot be accessed by at least one browser application other than the particular browser application. 2. The non-transitory computer-readable medium of claim 1, wherein the particular browser application is configured to unauthorize the client device from accessing the email resource responsive to at least one resource rule not being satisfied. 3. The non-transitory computer-readable medium of claim 2, wherein the resource rule further comprises a variably stringent resource rule, wherein a stringency of the variably stringent resource rule is based at least in part on a device state associated with the client device. 4. The non-transitory computer-readable medium of claim 3, wherein the device state further comprises information associated with a current time associated with the client device, a geographic location of the client device, at least one network accessible by the client device, or at least one network beacon accessible by the client device. 5. The non-transitory computer-readable medium of claim 4, wherein the device state further comprises information associated with a hardware feature of the client device, a software feature of the client device, or an application accessible by the client device. 6. The non-transitory computer-readable medium of claim 1, wherein the URL is designated as unauthorized. 7. The non-transitory computer-readable medium of claim 1, wherein the program further comprises program code that, when executed, causes the at least one computing device to unauthorize the client device from accessing the email resource responsive to at least one resource rule not being satisfied. 8. The non-transitory computer-readable medium of claim 1, wherein the program further comprises program code that, when executed, causes the at least one computing device to receive a request to access the email resource from the client device, the request comprising information regarding a device state associated with the client device. 9. A system, comprising: at least one computing device that comprises at least one hardware processor; andprogram code executed in the at least one computing device that causes the at least one computing device to at least: proxy an email server executing an email service to access an email resource requested by a client device from the email service;identify a uniform resource locator (URL) within the email resource;determine whether the URL is required to be accessed by a particular browser application; andresponsive to determining that the URL is required to be accessed by the particular browser application, modify the URL within the email resource to include a designation of the particular browser application, wherein the URL as modified cannot be accessed by at least one browser application other than the particular browser application. 10. The system of claim 9, wherein the program code that causes the at least one computing device to modify the URL within the email resource further comprises program code that causes the at least one computing device to encrypt the URL according to a particular encryption protocol, wherein the at least one browser application is not capable of decrypting the URL as encrypted. 11. The system of claim 10, wherein the particular browser application is capable of decrypting the URL as encrypted utilizing the particular encryption protocol. 12. The system of claim 9, further comprising program code that causes the at least one computing device to at least: determine whether at least one resource rule is satisfied; andresponsive to the at least one resource rule being satisfied, authorize the client device to access the email resource. 13. The system of claim 12, wherein the program code that causes the at least one computing device to authorize the client device to access the email resource further comprises program code that causes the at least one computing device to cause at least one decryption key to be transmitted to the client device, the at least one decryption key being required to access the email resource. 14. The system of claim 12, wherein the program code that authorizes the client device to access the email resource further comprises program code that causes the at least one computing device to initiate a transmission of the email resource to the client device. 15. The system of claim 12, wherein the program code that authorizes the client device to access the email resource further comprises program code that causes the at least one computing device to initiate a transmission of an authorization indication to the client device, the authorization indication specifying that the client device is authorized to access the email resource. 16. A method, comprising: accessing, by at least one computing device that comprises at least one hardware processor, an email resource requested by a client device from an email service;identifying, by the at least one computing device, a uniform resource locator (URL) within the email resource;determining, by the at least one computing device, whether the URL is required to be accessed by a particular browser application; andresponsive to determining that the URL is required to be accessed by the particular browser application, modifying, by the at least one computing device, the URL within the email resource to include a designation of the particular browser application, wherein the URL as modified cannot be accessed by at least one browser application other than the particular browser application. 17. The method of claim 16, wherein modifying the URL within the email resource further comprises encrypting, by the at least one computing device, the URL according to a particular encryption protocol, wherein the at least one browser application is not capable of decrypting the URL as encrypted. 18. The method of claim 17, wherein the particular browser application is capable of decrypting the URL as encrypted utilizing the particular encryption protocol. 19. The method of claim 16, further comprising: determining, by the at least one computing device, whether at least one resource rule is satisfied; andresponsive to the at least one resource rule being satisfied, authorizing, by the at least one computing device, the client device to access the email resource. 20. The method of claim 19, wherein authorizing the client device to access the email resource further comprises causing, by the at least one computing device, at least one decryption key to be transmitted to the client device, the at least one decryption key being required to access the email resource.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (116)
Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Shai Mohaban ; Itzhak Parnafes ; Yoram Ramberg IL; Yoram Snir IL; John Strassner, Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Farris Robert D. ; Flaherty Stephen J. ; Goodman William D., Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java.
Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
Wittstein Alan D. (Westport CT) Ciocca Giacomo A. (Thomaston CT), Mobile telephone device for storing a plurality of changable charge rates and time limit data.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Phillips John C. ; Hayes ; Jr. John J., Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Clark Ted H. ; Malisewski Steven C. ; Cooper Patrick R. ; Crosswy William Caldwell ; Crochet Larry J., System for automatic synchronization of common file between portable computer and host computer via communication channe.
Nagamatsu Jun (Kawasaki JPX) Terashima Masaki (Yokohama JPX) Yamada Jun (Yokohama JPX), System for preventing unauthorized use of a micro cellular system operating in coexistence with a cellular system.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
Kim, Jin Pil; Thomas, C. Gomer, Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.