Systems and methods for controlling email access
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/06
H04L-012/58
출원번호
US-0664279
(2017-07-31)
등록번호
US-10243932
(2019-03-26)
발명자
/ 주소
Dabbiere, Alan
Stuntebeck, Erich
Brannon, Jonathan Blake
출원인 / 주소
AirWatch, LLC
대리인 / 주소
Clayton, McKay & Bailey, PC
인용정보
피인용 횟수 :
0인용 특허 :
121
초록▼
Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys
Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys.
대표청구항▼
1. A method for controlling access to email attachments, comprising: providing a graphical user interface (GUI) that enables selection of at least one rule to govern email access for a plurality of users;receiving, through the GUI, a selection of an encryption rule that requires encrypting at least
1. A method for controlling access to email attachments, comprising: providing a graphical user interface (GUI) that enables selection of at least one rule to govern email access for a plurality of users;receiving, through the GUI, a selection of an encryption rule that requires encrypting at least one attachment to an email; andenforcing the selected encryption rule by encrypting the at least one email attachment, without interaction by a user sending the email. 2. The method of claim 1, further comprising: receiving, through the GUI, a selection of a removal rule that requires removing at least one attachment to an email; andenforcing the selected removal rule by removing the at least one email attachment, without interaction by a user sending the email. 3. The method of claim 1, wherein enforcing the selected encryption rule comprises encrypting the at least one email attachment with a cryptographic key accessible to a secure container application separate from an email application used to send or retrieve the email. 4. The method of claim 3, wherein enforcing the selected encryption rule comprises providing a key used to decrypt the encrypted email attachment only to the secure container application. 5. The method of claim 1, further comprising: enabling selection of a user group at the GUI, wherein the user group is a subset of the plurality of users;receiving, through the GUI, a selection of the user group associated with the encryption rule; andenforcing the selected encryption rule on the selected user group. 6. The method of claim 1, wherein the GUI enables selection of a storage location for the at least one rule. 7. The method of claim 1, wherein the GUI enables selection of an effective date or an expiration date for the at least one rule. 8. A non-transitory, computer-readable medium embodying a program executable in at least one computing device, comprising code that, when executed by the computing device, performs stages for controlling access to email attachments, the stages comprising: providing a graphical user interface (GUI) that enables selection of at least one rule to govern email access for a plurality of users;receiving, through the GUI, a selection of a removal rule that requires encrypting at least one attachment to an email; andenforcing the selected encryption rule by encrypting the at least one email attachment, without interaction by a user sending the email. 9. The non-transitory, computer-readable medium of claim 8, the stages further comprising: receiving, through the GUI, a selection of a removal rule that requires removing at least one attachment to an email; andenforcing the selected removal rule by removing the at least one email attachment, without interaction by a user sending the email. 10. The non-transitory, computer-readable medium of claim 8, wherein enforcing the selected encryption rule comprises encrypting the at least one email attachment with a cryptographic key accessible to a secure container application separate from an email application used to send or retrieve the email. 11. The non-transitory, computer-readable medium of claim 10, wherein enforcing the selected encryption rule comprises providing a key used to decrypt the encrypted email attachment only to the secure container application. 12. The non-transitory, computer-readable medium of claim 8, the stages further comprising: enabling selection of a user group at the GUI, wherein the user group is a subset of the plurality of users;receiving, through the GUI, a selection of the user group associated with the encryption rule; andenforcing the selected encryption rule on the selected user group. 13. The non-transitory, computer-readable medium of claim 8, wherein the GUI enables selection of a storage location for the at least one rule. 14. The non-transitory, computer-readable medium of claim 8, wherein the GUI enables selection of an effective date or an expiration date for the at least one rule. 15. A system for controlling access to email attachments, comprising: a processor that generates a graphical user interface (GUI) that enables selection of at least one rule to govern email access for a plurality of users; andan access control server communicatively coupled to the processor and configured to receive selections provided through the GUI,wherein the GUI receives a selection of an encryption rule that requires encrypting at least one attachment to an email, andwherein the access control server enforces the selected encryption rules by encrypting the at least one email attachment, without interaction by a user sending the email. 16. The method of claim 15, wherein the GUI receives a selection of a removal rule that requires removing at least one attachment to an email, and wherein the access control server enforces the selected removal rule by removing the at least one email attachment, without interaction by a user sending the email. 17. The method of claim 15, wherein enforcing the selected encryption rule comprises encrypting the at least one email attachment with a cryptographic key accessible to a secure container application separate from an email application used to send or retrieve the email. 18. The method of claim 17, wherein enforcing the selected encryption rule comprises providing a key used to decrypt the encrypted email attachment only to the secure container application. 19. The method of claim 15, wherein the GUI enables and receives selection of a user group that is a subset of the plurality of users, and wherein the access control server enforces the selected encryption rules on the selected user group. 20. The method of claim 15, wherein the GUI enables selection of at least one of a storage location, effective dates, and an expiration date for the at least one rule.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (121)
Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Shai Mohaban ; Itzhak Parnafes ; Yoram Ramberg IL; Yoram Snir IL; John Strassner, Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Farris Robert D. ; Flaherty Stephen J. ; Goodman William D., Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java.
Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
Wittstein Alan D. (Westport CT) Ciocca Giacomo A. (Thomaston CT), Mobile telephone device for storing a plurality of changable charge rates and time limit data.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Phillips John C. ; Hayes ; Jr. John J., Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Nagamatsu Jun (Kawasaki JPX) Terashima Masaki (Yokohama JPX) Yamada Jun (Yokohama JPX), System for preventing unauthorized use of a micro cellular system operating in coexistence with a cellular system.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
Kim, Jin Pil; Thomas, C. Gomer, Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.