Patent application number | Description | Published |
20100212011 | METHOD AND SYSTEM FOR SPAM REPORTING BY REFERENCE - Methods and systems for spam reporting by reference are described. In one embodiment, an electronic message may be received by a mobile electronic device. A spam report may be transmitted from the mobile electronic device to a report server. The spam report may notify the report server that the electronic message is spam and include a reference to the electronic message without including the electronic message itself. The reference may be usable to identify the received message. | 08-19-2010 |
20100216435 | METHOD AND SYSTEM TO AUTOMATICALLY PARK A VOICE CALL FOR DATA TRANSFER - A system and method to automatically park a voice call on a mobile electronic device so that the device can receive data, comprising a switch for establishing a voice call at the at least one caller device, a database for storing at least one call processing rule, and an enterprise data server for receiving a data message, comparing contents of the data message with at least one rule in the database, and in the event that the contents match the rule then parking the call, switching the mobile electronic device to a data mode of operation, downloading the data message to the device and un-parking the call. | 08-26-2010 |
20100217998 | System and Method for Managing Secure Registration of a Mobile Communications Device - In one embodiment, a method is provided for managing secure registration of a mobile communications device, the method comprising registering, at a network node, the mobile communications device using a first registration process, the first registration process requiring an authentication key associated with the mobile communications device; processing a request from the mobile communications device, the request including an indication that the mobile communications device is changing to a second registration process; and clearing the authentication key associated with the mobile communications device upon expiration of a time window. | 08-26-2010 |
20100223561 | METHOD AND DEVICE TO SIMPLIFY MESSAGE COMPOSITION - A method and device to simplify message reply composition on a communications device, using a partially transparent overlay to allow a user to freely scroll and move around to other sections of a message or message chain while still being able to see and edit the reply being composed. When the reply is scrolled such that the composition field is not visible on the display screen, the device displays the overlay when the user enters text or on user request. The user may then type text into the overlay while viewing the underlying portion of the reply message, such as previous messages in the string. | 09-02-2010 |
20100235212 | METHOD, SYSTEM AND APPARATUS FOR UPDATING A CALENDAR DATABASE FROM AN AVAILABILITY DATABASE AND A REPORTING STRUCTURE DATABASE - A method apparatus and system for assembling meeting data to update a calendar database are provided, based on meeting request data including meeting invitees and a given time period, and further based on availability data from at least one availability database. Availability data associated with each meeting invitee is processed to determine availability of each meeting invitee during the given time period, and determine at least one unavailable invitee that is unavailable during the given time period. Reporting structure data is processed, from a reporting structure, to determine a respective alternate invitee for each at least one unavailable invitee. Availability data associated with each alternate invitee is processed to determine whether each alternate invitee is available during the given time period. If so, meeting data is assembled, for storage in the calendar database, the meeting data including respective identifiers of meeting invitees available during the given time period and of each alternate invitee, and meeting data is caused to be stored in the calendar database. | 09-16-2010 |
20110016322 | SYSTEM AND METHOD FOR EXCHANGING KEY GENERATION PARAMETERS FOR SECURE COMMUNICATIONS - A communication system exchanges key generation parameters for secure communications. An internet service and communications device of a user are in communication with each other. The internet service includes an account authentication mechanism for a user and includes a database having stored cryptographic keys and key generation parameters. A device client operates on the communications device and initiates a request to the internet service that authenticates the user and establishes a secure communications channel between the internet service and communications device and determine key generation parameters based on an authenticated user identifier and transmits the key generation parameters for initiating key generation and securely establishing a cryptographic key between the internet service and communications device. | 01-20-2011 |
20110088091 | METHODS AND APPARATUS TO MAINTAIN VALIDITY OF SHARED INFORMATION - Example methods and apparatus to maintain validity of shared information are disclosed. A disclosed example method involves receiving a communication requesting an extensible markup language (XML) document from an XML document management client associated with a principal. In addition, the example method involves generating a subset of the XML document for the principal such that validity of the subset is ensured by including all document parts required according to an XML schema despite the principal having access rights to only certain parts of the XML document but not other parts. The other parts are included in the subset without values. | 04-14-2011 |
20110181517 | Providing a Prompt for Entry of Information at a Later Time - A method and apparatus are provided to prompt a user of a portable electronic device in such a way to allow the user to enter information later. In response to receiving a user input that indicates a request to enter information at a later time, and upon occurrence of a trigger at the later time, the portable electronic device presents a prompt configured to facilitate entry of the information. In one embodiment the user input is specific to a type of trigger or to a type of prompt needed at the later time. Furthermore, the portable electronic device may prepare a contextual cue in response to receiving the user input, and present a portion of the contextual cue at the later time to facilitate remembrance of the information that the user wished to enter. | 07-28-2011 |
20110211530 | System and Method for Securing a Personalized Indicium Assigned to a Mobile Communications Device - In one embodiment, a method operable on a mobile communications device is disclosed, the method comprising generating an authentication key for securing a personalized indicium assigned to the mobile communications device, wherein the personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with the mobile communications device; transmitting a registration request to a network node operable with a wireless network, the registration request having a registration request payload including the authentication key; receiving a challenge message from the network node, the challenge message generated when the network node detects a change of the IP address associated with the mobile communications device, and responsive to receiving the challenge message, executing a challenge response including an authentication value of a challenge string transmitted in the challenge message, wherein the authentication value is created using the authentication key. | 09-01-2011 |
20130007456 | SYSTEM AND METHOD FOR EXCHANGING KEY GENERATION PARAMETERS FOR SECURE COMMUNICATIONS - A communication system exchanges key generation parameters for secure communications. An internet service and communications device of a user are in communication with each other. The internet service includes an account authentication mechanism for a user and includes a database having stored cryptographic keys and key generation parameters. A device client operates on the communications device and initiates a request to the internet service that authenticates the user and establishes a secure communications channel between the internet service and communications device and determine key generation parameters based on an authenticated user identifier and transmits the key generation parameters for initiating key generation and securely establishing a cryptographic key between the internet service and communications device. | 01-03-2013 |