Patent application number | Description | Published |
20090221267 | NOTIFICATION OF ACCESS CONTROL REQUEST AND EXPLANATION INDICATIVE OF THE ACCESS CONTROL REQUEST ON A COMMUNICATION DEVICE - A communication device includes a display screen upon which information is displayed. A microprocessor configured to execute at least one notification program is provided that displays a notification descriptive of an access control request on the display screen. The at least one notification program is programmed to receive data indicative of an access control request and to receive data descriptive of the access control request. Additionally, the at least one notification program is further programmed to display a notification indicative of the access control request and comprising an explanation of the access control request based on the received descriptive data. | 09-03-2009 |
20090222657 | Methods And Apparatus For Use In Obtaining A Digital Certificate For A Mobile Communication Device - In one illustrative scenario, a mobile device receives configuration information which includes information for use in constructing a request message for obtaining a digital certificate from a certificate authority (CA). After receipt of the configuration information, the mobile device constructs the request message for the digital certificate and causes it to be sent to a host server of a communication network. In response, the host server requests and obtains the digital certificate from the CA on behalf of the mobile device, and thereafter “pushes” the received digital certificate to the mobile device. The mobile device receives the digital certificate and stores it for use in subsequent communications. The host server may be part of a local area network (LAN) which includes a wireless LAN (WLAN) adapted to authenticate the mobile device based on the digital certificate, so that the mobile device may obtain access to the WLAN. | 09-03-2009 |
20090222902 | Methods And Apparatus For Use In Enabling A Mobile Communication Device With A Digital Certificate - In one illustrative scenario, a mobile communication device causes a communication session to be established with a host server of a communication network. The mobile device performs communication operations in the communication session for activating a communication service, such as a data synchronization service, with the host server. In the communication session, the mobile device also receives configuration information which includes information for use in constructing a request message for obtaining a digital certificate from a certificate authority (CA). After receipt of the configuration information, the mobile device constructs the request message for the digital certificate and causes it to be sent to the host server. In response, the host server requests and obtains the digital certificate from the CA on behalf of the mobile device, and thereafter “pushes” the received digital certificate to the mobile device. The mobile device receives the digital certificate and stores it for use in subsequent communications. The host server may be part of a local area network (LAN) which includes a wireless LAN (WLAN) adapted to authenticate the mobile device based on the digital certificate, so that the mobile device may obtain access to the WLAN. | 09-03-2009 |
20090313705 | SECURITY MEASURES FOR COUNTERING UNAUTHORIZED DECRYPTION - After a predetermined limit for decryption attempts has been exceeded by a user attempting to decrypt an encrypted electronic message or attempting to decrypt a encrypted electronic certificate associated with an electronic message, access to the electronic message may be restricted. | 12-17-2009 |
20100050187 | Methods And Apparatus For Maintaining Permissions For Client/Server Processing In A Communication Device - A communication device has memory for storing a client application module, a server application module, and an operating system module which are executable by one or more processors. The client application module submits a request and, in response, the server application module causes the request to be processed with use of the operating system module. Prior to processing, an interface module causes one or more client process handles of a client stack of the client application module to be provided in a current process base of the operating system module. Thus, for the request, the operating system module checks one or more permission settings associated with the one or more client process handles as well as one or more permission settings associated with the one or more server process handles. The operating system module allows the request to be processed if the one or more permission settings associated with the one or more client process handles and the one or more permission settings associated with the one or more server process handles indicate that permission is granted, but otherwise denies the processing of the request if any one of the permission settings associated with the one or more client process handles and the one or more server process handles indicate that permission is denied. | 02-25-2010 |
20110085527 | CALL DESTINATION NUMBER MAPPING METHODS, DEVICES AND SYSTEMS - A call destination mapping method executes on a mobile communication device. The mobile communication device requests a call action within the device for a first call destination number of a call destination, maps the first call destination number to a second call destination number in accordance with one or more call destination mapping rules stored on the device, and replaces the first call destination number in the call action with the second call destination number. | 04-14-2011 |
20110154041 | METHOD TO SECURELY TRANSFER USER ENCRYPTION KEYS AND SERVICES BETWEEN MOBILE DEVICES - A method for securely transferring a service from a first mobile device to a second mobile device, the service being associated with a server configured for facilitating provisioning of services to mobile devices over a wireless communications network. The method includes generating in the first mobile device a shared key, the shared key being generated using a master key unique to the server and to the first mobile device, the master key being accessible by the server and by the first mobile device; and sending said shared key from the first mobile device to the second mobile device using an alternate communication mechanism independent from the server. | 06-23-2011 |
20110214184 | System and method for controlling applications to mitigate the effects of malicious software - Methods and systems for mitigating the effects of a malicious software application are disclosed. A dedicated module on the computing device receives from a malicious software detector a message indicating whether the application is malicious or has a malicious component. The dedicated module obtains a set of permissions to be granted to the application, and instructs software on the computing device that controls the permissions of the application to grant the set of permissions. | 09-01-2011 |
20110225427 | USE OF CERTIFICATE AUTHORITY TO CONTROL A DEVICE'S ACCESS TO SERVICES - A mobile communications device having a digital certificate authenticating the device itself is proposed. A server for authenticating the device and a method of authenticating the device are also disclosed. The device comprises a transmitter, a processor, a memory and a computer readable medium. The memory includes a certificate certifying the authenticity of the mobile communications device, the certificate comprising device-specific data and a digital signature signed by an authority having control of the authenticity of the mobile communications device. The computer readable medium has computer readable instructions stored thereon that when executed configure the processor to instruct the transmitter to transmit a copy of the certificate to a service provider in response to a request to authenticate the mobile communications device with the service provider. | 09-15-2011 |
20110276803 | SYSTEM AND METHOD FOR MULTI-CERTIFICATE AND CERTIFICATE AUTHORITY STRATEGY - Operations or functions on a device may require an operational certificate to ensure that the user of the device or the device itself is permitted to carry out the operations or functions. A system and a method are provided for providing an operational certificate to a device, whereby the operational certificate is associated with one or more operations of the device. A manufacturing certificate authority, during the manufacture of the device, obtains identity information associated with the device and provides a manufacturing certificate to the device. An operational certificate authority obtains and authenticates at least a portion of the identity information associated with the device from the manufacturing certificate and, if at least the portion of the identity information is authenticated, the operational certificate is provided to the device. | 11-10-2011 |
20120075057 | COMMUNICATIONS SYSTEM PROVIDING PERSONNEL ACCESS BASED UPON NEAR-FIELD COMMUNICATION AND RELATED METHODS - A security system may include an access control device associated with a personnel access position. The access control device may include a first Near-Field Communication (NFC) sensor, and a first controller configured to selectively grant personnel access based upon receiving a valid security code from the first NFC sensor, and to deny personnel access and generate an access denial electronic message(s) based upon receiving an invalid security code from the first NFC sensor. The system may also include a mobile wireless communications device(s) including a second NFC sensor and a second controller, which may be configured to communicate a security code via the second NFC sensor to the first NFC sensor based upon proximity therewith, and to receive a corresponding access denial electronic message from the first controller based upon the security code being invalid. | 03-29-2012 |
20120079007 | METHOD, APPARATUS AND SYSTEM FOR ACCESSING APPLICATIONS AND CONTENT ACROSS A PLURALITY OF COMPUTERS - A method, apparatus and system for accessing applications and content across a plurality of computers is provided. In one aspect, a client machine and a mobile computing device are provided. The client machine is configured to execute a browser application. The mobile computing device is configured to host a web server application. When the client machine and the mobile computing device are connected, functions on the mobile computing device become available on the client machine via the interaction between the web server and the browser. When the client machine accesses an email or other message with referenced content, different portions of the system can be configured to select a particular pathway to actually fetch the content. | 03-29-2012 |
20120079110 | METHOD AND APPARATUS FOR DIFFERENTIATED ACCESS CONTROL - A method for differentiated access control on a computing device having a connection with a second device, the method checking whether a timer has expired on the second device or if a connection is lost to the second device; and preventing at least one of the plurality of application subsets from being launched or enabled if the timer has expired on the second device or the connection is lost to the second device. | 03-29-2012 |
20120079122 | DYNAMIC SWITCHING OF A NETWORK CONNECTION BASED ON SECURITY RESTRICTIONS - Systems and methods for providing access to an enterprise network from a remote computer are described. In one example, a system includes a mobile device configurable for connection to the remote computer, the mobile device adapted to establish secure communication to the enterprise network and a connection server application located on the mobile device for receiving a request from the remote computer specifying a location and a connection path and selectively providing to the remote computer access to the enterprise network via the mobile device based on the request. Other implementations are possible. | 03-29-2012 |
20120079423 | LAUNCHING AN APPLICATION BASED ON DATA CLASSIFICATION - Apparatus and methods provide control of the launching of an application based on data classification relative to one of a plurality of workspaces of a system. The apparatus can include operations, with respect to applications that conduct file access, to force generation of a prompt, prior to the application being launched, to receive a signal corresponding to the file access related to selection of a particular workspace, where the workspace is arranged in a structure to provide security to the plurality of workspaces. Additional apparatus, systems, and methods are disclosed. | 03-29-2012 |
20120079586 | METHOD AND APPARATUS FOR DIFFERENTIATED ACCESS CONTROL - A method for differentiated access control on a computing device, and the computing device, the method including starting a timer on the computing device; resetting the timer if activity occurs on the computing device prior to the expiration of the timer; and preventing a subset of applications from being launched or enabled on expiry of the timer. | 03-29-2012 |
20120079609 | METHOD FOR ESTABLISHING A PLURALITY OF MODES OF OPERATION ON A MOBILE DEVICE - A method, device and system for establishing plural modes of operation on a mobile device, including: associating each application on the mobile device with one of a plurality of modes; and restricting access to data on the mobile device to only a subset of applications based on the mode associated for the each application. A system includes connection of an untrusted device to a trusted device and restricting data access for restricted data to a subset of trusted applications on the untrusted device. | 03-29-2012 |
20120124640 | DATA SOURCE BASED APPLICATION SANDBOXING - A computing device and a method for a computing device to control access to data stored on a data store of the device. An access component of the device having control over access to the data. The access component being operative to receive a request for data from a requesting component, identify an assigned access domain of the requesting component and an assigned data domain of the requested data and determine whether the requesting component is authorized to access the data by comparing the assigned access domain and the data domain with permissions specified in a security policy. If the assigned access domain is authorized to access the data domain, the access component may provide access to the requested data. | 05-17-2012 |
20120155637 | SYSTEM AND METHOD FOR HARDWARE STRENGTHENED PASSWORDS - A cryptographic module and a computing device implemented method for securing data using a cryptographic module is provided. The cryptographic module may include an input component for receiving a password, an output component for outputting data to the computing device, a random number generator for generating a random number and a module processor operative to generate at least one cryptographic key using the generated random number, and to record an association between the received password linking the received password with the at least one cryptographic key in a data store accessible to the cryptographic module. | 06-21-2012 |
20130093596 | NOTIFICATION OF ACCESS CONTROL REQUEST AND EXPLANATION INDICATIVE OF THE ACCESS CONTROL REQUEST ON A COMMUNICATION DEVICE - A communication device includes a display screen upon which information is displayed. A microprocessor configured to execute at least one notification program is provided that displays a notification descriptive of an access control request on the display screen. The at least one notification program is programmed to receive data indicative of an access control request and to receive data descriptive of the access control request. Additionally, the at least one notification program is further programmed to display a notification indicative of the access control request and comprising an explanation of the access control request based on the received descriptive data. | 04-18-2013 |
20130117559 | System and Method for Multi-Certificate and Certificate Authority Strategy - Operations or functions on a device may require an operational certificate to ensure that the user of the device or the device itself is permitted to carry out the operations or functions. A system and a method are provided for providing an operational certificate to a device, whereby the operational certificate is associated with one or more operations of the device. A manufacturing certificate authority, during the manufacture of the device, obtains identity information associated with the device and provides a manufacturing certificate to the device. An operational certificate authority obtains and authenticates at least a portion of the identity information associated with the device from the manufacturing certificate and, if at least the portion of the identity information is authenticated, the operational certificate is provided to the device. | 05-09-2013 |
20140149739 | USE OF CERTIFICATE AUTHORITY TO CONTROL A DEVICE'S ACCESS TO SERVICES - A mobile communications device having a digital certificate authenticating the device itself is proposed. A server for authenticating the device and a method of authenticating the device are also disclosed. The device comprises a transmitter, a processor, a memory and a computer readable medium. The memory includes a certificate certifying the authenticity of the mobile communications device, the certificate comprising device-specific data and a digital signature signed by an authority having control of the authenticity of the mobile communications device. The computer readable medium has computer readable instructions stored thereon that when executed configure the processor to instruct the transmitter to transmit a copy of the certificate to a service provider in response to a request to authenticate the mobile communications device with the service provider. | 05-29-2014 |
Patent application number | Description | Published |
20110179465 | APPARATUS, AND AN ASSOCIATED METHOD, FOR FACILITATING SECURE OPERATIONS OF A WIRELESS DEVICE - An apparatus, and an associated method, facilitates security at a wireless device, such as a wireless device comprising a mobile computing platform. A security decision engine is provided that monitors for an event necessitating a security decision. When a security decision is required, request is made of a knowledge fetcher, provided by a trusted third-party, installed at the wireless device for the security decision. The knowledge fetcher obtains the security decision, such as by obtaining the security decision from a remote, trusted third-party server, and provides the security decision to the decision engine. Use is made of the security decision pursuant to a setting for which the security decision is needed. | 07-21-2011 |
20120140927 | CROSS-COMPONENT MESSAGE ENCRYPTION - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, encrypt and sign the composite message. Conveniently, security considerations are maintained even in view of bandwidth optimization measures. | 06-07-2012 |
20120214413 | MOBILE WIRELESS COMMUNICATIONS DEVICE ESTABLISHING WIRELESS COMMUNICATION LINKS BASED UPON NEAR FIELD COMMUNICATION AND RELATED METHODS - A wireless communications system may include first and second mobile wireless communications devices each comprising a respective input device, wireless transceiver, near-field communication (NFC) transceiver, and controller coupled to the input device, wireless transceiver and NFC transceiver. At least one of the controllers may be configured to establish an NFC communications link between the NFC transceivers when the first and second mobile wireless communications devices are in proximity, provide a temporary device identifier (ID) via the NFC communications link, request authorization to establish a wireless link between the wireless transceivers, provide a permanent device ID upon receiving the authorization and based upon the temporary device ID, and establish the wireless link between the wireless transceivers based upon the permanent device ID. | 08-23-2012 |
20120317190 | METHODS AND APPARATUS FOR MAINTAINING PERMISSIONS FOR CLIENT/SERVER PROCESSING IN A COMMUNICATION DEVICE - A communication device has memory for storing a client application module, a server application module, and an operating system module which are executable by one or more processors. The client application module submits a request and, in response, the server application module causes the request to be processed with use of the operating system module. One or more client process handles of a client stack of the client application module are provided in a current process base of the operating system module. For the request, one or more permission settings associated with the one or more client process handles as well as one or more permission settings associated with the one or more server process handles are checked. | 12-13-2012 |
20130097316 | Associating Services to Perimeters - In some implementations, a method includes receiving, from a user of a first device, a request to enable access, through a second device, to a server resource account of an enterprise. The first device includes a first enterprise perimeter including an internal resource and a first enterprise identifier and configured to prevent external resources from accessing the internal resource. A request is wirelessly transmit, to the second device, to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device. Whether to grant access to the internal resource is determined based on a first enterprise identifier assigned to the first device and a second enterprise identifier assigned to the second device. | 04-18-2013 |
20130124583 | Presenting Metadata From Multiple Perimeters - In some implementations, a method for managing data in a user device includes pushing first metadata for a first resource in a first perimeter to a service external to the first perimeter. The first perimeter is configured to prevent external resources from accessing resources in the first perimeter. Second metadata for a second resource in a second perimeter is pushed to the external service. The external service is external to the second perimeter, the second perimeter being configured to prevent external resources from accessing resources in the second perimeter. Information is presented to the user based on a combination of the first metadata and the second metadata. | 05-16-2013 |
20130125198 | MANAGING CROSS PERIMETER ACCESS - In some implementations, a method of managing access to resources in a single device including receiving, from a first resource assigned to a first perimeter, a request to access a second resource assigned to a second perimeter different from the first perimeter. The single device includes the first perimeter and the second perimeter. Whether access to the second resource is prohibited is determined based on a management policy for the first perimeter. The management policy defining one or more rules for accessing resources assigned to the second perimeter including the second resource. | 05-16-2013 |
20130212392 | KEY MANAGEMENT ON DEVICE FOR PERIMETERS - There is provided a method and apparatus for resetting a password for a device or managing the device, the device having an encryption perimeter. A device shares a public/private key pair with a server, the public key being on the device and the private key being on the server. An intermediate value is encrypted on the mobile device using the public key. If the password is lost or the device needs to be managed, the server can request the encrypted intermediate value, decrypt it, and send the decrypted value to the mobile device which may then resume operations. A new password may be provided by the server or the user may set a new password once the encryption key is recreated from the decrypted intermediate value. | 08-15-2013 |
20130219455 | CERTIFICATE MANAGEMENT METHOD BASED ON CONNECTIVITY AND POLICY - Plural modes of operation may be established on a mobile device. Specific modes of operation of the mobile device may be associated with specific spaces in memory. By associating the existing certificate store structure and key store structure with a mode of operation, certificates and keys can be assigned to one space among plural spaces. Furthermore, management (viewing/importation/deletion) of certificates associated with specific modes of operation may be controlled based on the presence or absence of a mobile device administration server and the status (enabled/disabled) of an IT policy. | 08-22-2013 |
20130227637 | METHOD AND APPARATUS FOR MANAGEMENT OF MULTIPLE GROUPED RESOURCES ON DEVICE - A method and computing device for managing grouped resources comprising receiving, at the computing device, a policy for a set of grouped resources; applying the policy; locking at least one of the computing device or the set of grouped resources associated with the policy; waiting for receipt of an authentication parameter at the computing device; verifying the authentication parameter; associating the set of grouped resources with the authentication parameter; and unlocking the least one of the computing device or the set of grouped resources. | 08-29-2013 |
20130346606 | Managing Use of Network Resources - Some aspects of what is described here relate to managing the use of network resources on a mobile device. User input received at the device indicates whether to allow an application associated with a first perimeter on the device to access a network resource associated with a second perimeter on the device. For example, in some instances user input may indicate whether to allow data from applications associated with a personal perimeter on the device to be transmitted over an enterprise communication system. When outbound data associated with the first perimeter are received, the device determines, according to the indication from the user input, whether to route the outbound data to the network resource associated with the second perimeter. | 12-26-2013 |
20140115158 | MANAGING APPLICATION EXECUTION AND DATA ACCESS ON A DEVICE - Some aspects of what is described here relate to managing application execution and data access on a mobile device. A request to access data is received from an application associated with a first perimeter on a device. The data is associated with a second, different perimeter on the device and has a data type. It is determined, based on the data type, that a management policy associated with the first perimeter permits the application to access the data independent of a second, different management policy assigned to the second perimeter. Based on the determining, the application is provided access to the data. | 04-24-2014 |
20140203904 | COMMUNICATIONS SYSTEM PROVIDING PERSONNEL ACCESS BASED UPON NEAR-FIELD COMMUNICATION AND RELATED METHODS - A security system may include an access control device associated with a personnel access position. The access control device may include a first Near-Field Communication (NFC) sensor, and a first controller configured to selectively grant personnel access based upon receiving a valid security code from the first NFC sensor, and to deny personnel access and generate an access denial electronic message(s) based upon receiving an invalid security code from the first NFC sensor. The system may also include a mobile wireless communications device(s) including a second NFC sensor and a second controller, which may be configured to communicate a security code via the second NFC sensor to the first NFC sensor based upon proximity therewith, and to receive a corresponding access denial electronic message from the first controller based upon the security code being invalid. | 07-24-2014 |
20140207821 | PRESENTING METADATA FROM MULTIPLE PERIMETERS - In some implementations, a method for managing data in a user device includes pushing first metadata for a first resource in a first perimeter to a service external to the first perimeter. The first perimeter is configured to prevent external resources from accessing resources in the first perimeter. Second metadata for a second resource in a second perimeter is pushed to the external service. The external service is external to the second perimeter, the second perimeter being configured to prevent external resources from accessing resources in the second perimeter. Information is presented to the user based on a combination of the first metadata and the second metadata. | 07-24-2014 |
20140337937 | METHODS AND DEVICES FOR DETECTING UNAUTHORIZED ACCESS TO CREDENTIALS OF A CREDENTIAL STORE - Methods and devices for detecting unauthorized access to credentials of a credential store on a computing device are disclosed herein. In one broad aspect, the method comprises monitoring a plurality of credentials of the credential store accessed within a period associated with a first setting, and responsive to determining that a number of credentials accessed within the period exceeds a threshold associated with a second setting, outputting, in a user interface, an indication of potential unauthorized access to the credential store. In at least one embodiment, each of the credentials accessed within the period is associated with a different user account. | 11-13-2014 |
20140337941 | METHODS AND DEVICES FOR PROVIDING WARNINGS ASSOCIATED WITH CREDENTIALS TO BE STORED IN A CREDENTIAL STORE - Methods and devices for providing a warning associated with credentials to be stored in a credential store on a computing device are disclosed herein. In one broad aspect, the method comprises receiving a request to store, in the credential store, at least one credential for a specified service, determining whether a secure connection between the computing device and the specified service is available, associating the specified service with a level of security based on at least one of an availability of the secure connection or one or more properties of the secure connection, and providing a warning in response to determining that at least one credential stored in the credential store corresponds to the at least one credential for the specified service and is for a service that is associated with a level of security different from the level of security with which the specified service is associated. | 11-13-2014 |
20140373155 | SYSTEM AND METHOD FOR CONTROLLING APPLICATIONS TO MITIGATE THE EFFECTS OF MALICIOUS SOFTWARE - Methods and systems for mitigating the effects of a malicious software application are disclosed. A dedicated module on the computing device receives from a malicious software detector a message indicating whether the application is malicious or has a malicious component. The dedicated module obtains a set of permissions to be granted to the application, and instructs software on the computing device that controls the permissions of the application to grant the set of permissions. | 12-18-2014 |
20150074754 | CERTIFICATE MANAGEMENT METHOD BASED ON CONNECTIVITY AND POLICY - Plural modes of operation may be established on a mobile device. Specific modes of operation of the mobile device may be associated with specific spaces in memory. By associating the existing certificate store structure and key store structure with a mode of operation, certificates and keys can be assigned to one space among plural spaces. Furthermore, management (viewing/importation/deletion) of certificates associated with specific modes of operation may be controlled based on the presence or absence of a mobile device administration server and the status (enabled/disabled) of an IT policy. | 03-12-2015 |
20150127952 | METHOD AND APPARATUS FOR CONTROLLING ACCESS TO ENCRYPTED DATA - A method and apparatus for controlling access to encrypted data is provided. The device comprises: a processor and a memory, the processor configured to: control access to encrypted data, stored at the memory, the encrypted data categorized according to a plurality of categories, using a respective encryption key for each category in the plurality of categories; and, control access to a given encryption key according to given criteria associated with a given category, respective criteria different for each respective category, access to the given encryption key including one or more of, when the respective criteria are met: generating the given encryption key and decrypting the given encryption key. | 05-07-2015 |
Patent application number | Description | Published |
20130021236 | Orientation Based Application Launch System - An electronic device may include multiple faces, an application launch input element, a memory that stores multiple applications, and a processor that accesses the memory. In response to a detected trigger of the application launch input element, the processor determines the orientation of the device. For example, the processor may determine which face of the electronic device is pointed in a predetermined direction. Based on the determined orientation of the device, the processor selects and activates a specific application from the multiple available applications. | 01-24-2013 |
20130024816 | Connection Status Based Application Launch System - An electronic device may include a connection status determination processor, an application selection processor, an application launch input element, and one or more connection interfaces. In response to a trigger of the application launch input element, the connection status determination processor determines a status of the connection interfaces. The application selection processor selects and activates an application based on the status of the connection interfaces. For example, the application selection processor may activate a different application when the connection interfaces reflect a first active connection state than when the one or more connection interfaces reflect a second active connection state. | 01-24-2013 |
20130147719 | APPARATUS, AND ASSOCIATED METHOD, FOR TEMPORARILY LIMITING OPERABILITY OF USER-INTERFACE PORTION OF COMMUNICATION DEVICE - An apparatus, and an associated method, disables the functionality of a portion of a user interface of a communication device, such as a wireless device, for a limited period. A detector detects an alert, (such as an alert communication activity,) such as the delivery at the communication device of notification of a communication termination at the communication device. Responsive to the detection, a portion of the user interface is disabled by a disabler. Disabling of the portion of the user interface is for a limited period and prevents a user of the device from inadvertently rejecting, or accepting the terminating communication until the limited period expires. | 06-13-2013 |
20140135073 | PHONEWORD DIALING IN A MOBILE COMMUNICATION DEVICE HAVING A FULL KEYBOARD - A method of dialing a phoneword using a mobile communication device that has full keyboard, which maps numbers to letters differently than on standard telephone keypads. The method detects the prefix of the phoneword and proceeds to display a message on the mobile communication device to indicate that a pre-determined key needs to be pressed before entering letters of the phoneword. The method can also display for selection, candidate phonewords that correspond to a partial entry of the phoneword. | 05-15-2014 |
20140253320 | System and Method for Providing an Alarm Notification - A system and method are provided for outputting alarm notifications. The method comprises: prior to activating an alarm on the electronic device, determining, from data stored on the electronic device, whether at least one of a predetermined type of event exists; and outputting a first modified alarm notification to indicate a relatively more urgent alarm if at least one of the predetermined type of event exists. | 09-11-2014 |
Patent application number | Description | Published |
20080227831 | FOOD EXTRACTS FOR TREATMENT OF LIPOPROTEIN ABNORMALITIES AND SKIN DISEASES AND SKIN DISORDERS - The present invention is directed to N-methylnicotinamide containing food extracts, and their use in treating lipoprotein abnormalities and skin diseases and disorders. | 09-18-2008 |
20090016956 | Labeled Macrophages and Methods of Use Thereof - Methods of making and using labeled macrophages are described. | 01-15-2009 |
20090252704 | THERAPIES FOR COGNITION AND LEARNING ENHANCEMENT - The invention relates to a combination comprising an amount of an NO donor, such as ISDN, and/or an amount of another pharmaceutical agent that enhances neurotransmission or which acts as neuroprotectants such as memantine, clomethiazole and tacrine. These compositions can be used in producing cognition and learning enhancement, whereby the invention also provides for a new method of treatment of Alzheimer's disease and related neurodegenerative disorders. | 10-08-2009 |
20100120726 | 1-Methylnicotinamide Derivatives and Formulations of Treatment of Lipoprotein Abnormalities - The present invention is directed to nicotinamide derivatives, and their use in treating lipoprotein abnormalities, alone or in combination with a statin. | 05-13-2010 |
20100221247 | AGENTS AND METHODS FOR TREATMENT OF CANCER - The present application describes compositions that are useful for the treatment, prevention and/or amelioration of cancer. | 09-02-2010 |
20110096157 | MICROSCOPY IMAGING - Among other things, an imaging device has a photosensitive array of pixels, and a surface associated with the array is configured to receive a specimen with at least a part of the specimen at a distance from the surface equivalent to less than about half of an average width of the pixels. | 04-28-2011 |
20120245115 | 1-Methylnicotinaide Derivatives and Formulations of Treatment of Lipoprotein Abnormalities - The present invention is directed to nicotinamide derivatives, and their use in treating lipoprotein abnormalities, alone or in combination with a statin. | 09-27-2012 |
20130245078 | SALT COMPOUND - A salt compound, and methods for mitigating neurodegeneration, effecting neuroprotection and/or effecting cognition enhancement in a subject using the salt compound are described. Neurological or cognitive conditions are treated by administering to a subject an effective amount of a therapeutic salt compound comprising a nitrate ester. | 09-19-2013 |
20130281888 | TASK-ASSOCIATED MOTION ANALYSIS - Systems and methods for task-associated motion analysis are provided. In the task-associated motion analysis system, a protocol including one or more motion-based tasks is performed by a patient. The patient's performance is recorded using one or more sensors and the patient's data is compared to normative data to assess musculoskeletal performance for the purposes of diagnosis and administration of therapy or training recommendations. | 10-24-2013 |
20130303860 | SYSTEMS AND METHODS FOR USE IN FALL RISK ASSESSMENT - Systems and methods for use in patient fall risk assessment are provided. In the fall risk assessment system, a Protocol including one or more motion-based tests is performed by a patient. The patient's performance is recorded using one or more sensors and the patient's data is compared to normative data to assess risk within the multifactorial problem of fall risk assessment and management. | 11-14-2013 |