Systems and methods for controlling email access
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-012/58
G06F-021/60
H04L-029/06
H04L-029/08
G06F-021/62
H04W-004/02
출원번호
US-0585309
(2014-12-30)
등록번호
US-9853928
(2017-12-26)
발명자
/ 주소
Dabbiere, Alan
Stuntebeck, Erich
Brannon, Jonathan Blake
출원인 / 주소
AirWatch LLC
인용정보
피인용 횟수 :
0인용 특허 :
88
초록▼
Disclosed are various examples for providing secure access to email resources. Email resources associated with client devices may be identified, and resource rules associated with the email resources may be identified. A determination of whether the email resources satisfy the resource rules may be
Disclosed are various examples for providing secure access to email resources. Email resources associated with client devices may be identified, and resource rules associated with the email resources may be identified. A determination of whether the email resources satisfy the resource rules may be made. If the email resources do not satisfy the resource rules, the email resources may be modified based at least in part on the resource rules
대표청구항▼
1. A method, comprising: identifying a plurality of email resources associated with a client device;identifying at least one resource rule that specifies that the client device is only authorized to access the email resources when a portion of individual ones of the email resources is configured for
1. A method, comprising: identifying a plurality of email resources associated with a client device;identifying at least one resource rule that specifies that the client device is only authorized to access the email resources when a portion of individual ones of the email resources is configured for exclusive access by a secure container application executable by the client device, wherein the secure container application is configured to prevent performance of at least one of: a cut function, a copy function, and a screen capture function on the client device;determining that the email resources do not satisfy the at least one resource rule;in response to the email resources not satisfying the at least one resource rule: causing the portion of the individual ones of the email resources to be configured for exclusive access by the secure container application by encrypting the portion of the individual ones of the email resources using a cryptographic key;identifying a request by the secure container application executable by the client device to access an encrypted portion of at least one of the email resources;providing the cryptographic key to the secure container application on the client device; andproviding the encrypted portion of the at least one of the email resources to the client device for access by the secure container application. 2. The method of claim 1, further comprising authorizing the client device to access the email resources. 3. The method of claim 1, further comprising determining that a particular user of the client device is authorized to access the email resources based at least in part on the at least one resource rule; andin response to the particular user of the client device being authorized to access the email resources based at least in part on the at least one resource rule, permitting access to the email resources on the client device associated with the client device. 4. The method of claim 1, wherein the at least one resource rule comprises at least one of: a format rule, a content rule, an attachment rule, or an access rule. 5. The method of claim 1, wherein causing the at least one particular portion of the email resources to be configured to be exclusively accessible to the secure container application comprises: removing the portion of the individual ones of the email resources from the individual ones of the email resources;encrypting the portion of the individual ones of the email resources as removed using the cryptographic key; andproviding the portion of the individual ones of the email resources to client device; andproviding a remaining portion of the individual ones of the email resources to the client device, wherein at least one unauthorized client application is capable of accessing the remaining portion of the email resources and the secure container application is capable of accessing the encrypted portion of the email resources using the cryptographic key. 6. The method of claim 1, wherein the secure container application is configured to prevent at least one unauthorized application executable by the client device from accessing data within a data store associated with the secure container application. 7. The method of claim 6, wherein the secure container application is further configured to prevent the performance of at least one of: a print function, a transmission function, and a paste function. 8. The method of claim 1, further comprising causing a stringency level of the at least one resource rule to be modified based at least in part on a state of the client device. 9. A non-transitory computer-readable medium embodying program code executable by at least one computing device that, when executed, causes the at least one computing device to: access at least one email resource associated with a client device;identify at least one resource rule that specifies that the client device is only authorized to access the at least one email resource when a predetermined portion of the at least one email resource is configured for exclusive access by a secure container application executable by the client device, wherein the secure container application is configured to prevent performance of at least one of: a cut function, a copy function, and a screen capture function on the client device;determine that the at least one email resource does not satisfy the at least one resource rule; andin response to the at least one email resource not satisfying the at least one resource rule: causing the predetermined portion of the at least one email resource to be configured for exclusive access by the secure container application by encrypting the predetermined portion of the at least one email resource using a cryptographic key;identify a request by the particular secure container application executable by the client device to access the predetermined portion of the at least one email resource; andsend the cryptographic key to the client device for access by the secure container application; andprovide the encrypted portion of the at least one of the email resources to the client device for access by the secure container application. 10. The non-transitory computer-readable medium of claim 9, further comprising program code that, when executed, causes the at least one computing device to authorize the client device to access the at least one email resource. 11. The non-transitory computer-readable medium of claim 9, further comprising program code that, when executed, causes the at least one computing device to: determine that a particular user of the client device is authorized to access the at least one email resource based at least in part on the at least one resource rule; andin response to the particular user of the client device being authorized to access the at least one email resource based at least in part on the at least one resource rule, provide access to the at least one email resource on the client device. 12. The non-transitory computer-readable medium of claim 9, wherein the at least one resource rule comprises at least one of: a format rule, a content rule, an attachment rule, and an access rule. 13. The non-transitory computer-readable medium of claim 9, further comprising program code that, when executed, causes the at least one computing device to: remove the predetermined portion of the at least one email resource from the at least one email resource; andencrypt the predetermined portion of the at least one email resource as removed using the cryptographic key;provide the predetermined portion of the at least one email resource to the client device; andprovide a remaining portion of the at least one email resource to the client device, wherein at least one client application is capable of accessing to remaining portion of the at least one email resource and the secure container application is capable of accessing the predetermined portion using the cryptographic key. 14. The non-transitory computer-readable medium of claim 9, wherein the secure container application is configured to prevent at least one unauthorized application executable by the client device from accessing data within a data store associated with the secure container application. 15. The non-transitory computer-readable medium of claim 9, wherein the secure container application is further configured to prevent the performance of at least one of: a print function, a transmission function, and a paste function. 16. The non-transitory computer-readable medium of claim 9, wherein the program further comprises code that causes the at least one computing device to at least cause a stringency level of the at least one resource rule to be modified based at least in part upon a state of the client device. 17. A system, comprising: at least one computing device comprising at least one hardware processor; andmemory comprising program instructions that, when executed by the at least one hardware processor, cause the at least one computing device to: identify a plurality of email resources accessible to a client device associated with a user account;identify at least one resource rule that specifies that the client device is only authorized to access the email resources in response to a predetermined portion of individual ones of the email resources being configured for exclusive access by a secure container application executable by the client device, wherein the secure container application is configured to prevent performance of a screen capture function on the client device when executed;determine that the email resources do not satisfy the at least one resource rule;in response to the email resources not satisfying the at least one resource rule: causing the predetermined portion of the individual ones of the email resources to be configured for exclusive access by the secure container application by encrypting the predetermined portion of the individual ones of the email resources using at least one cryptographic key;identify a request by the secure container application to access the predetermined portion of at least one of the email resources;send the at least one cryptographic key to the client device for access by the secure container application; andprovide the encrypted portion of the at least one of the email resources to the client device for access by the secure container application. 18. The system of claim 17, wherein the at least one resource rule comprises at least one of: a format rule, a content rule, an attachment rule, and an access rule. 19. The system of claim 17, wherein the predetermined portion of the individual ones of the email resources is removed from the email resources prior to encryption. 20. The system of claim 17, wherein at least one cryptographic key is not accessible to at least one unauthorized application executable by the client device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (88)
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Kim, Jin Pil; Thomas, C. Gomer, Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.