Patent application number | Description | Published |
20100133342 | SECURE USE OF EXTERNALLY STORED DATA - A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response APDU, wherein the filtered response APDU does not include the authentication data. Beneficially, when the smart card reader transmits the filtered response APDU toward a destination, the biometric template data is less susceptible to interception, thereby providing a more secure solution. | 06-03-2010 |
20100140348 | SYSTEM AND METHOD OF MULTIPLE SMART CARD DRIVER SUPPORT - By thoroughly investigating compatibility of a plurality of smart card drivers to applications available on a given smart card, a smart card framework module may be afforded additional flexibility in communications with the smart card. The additional flexibility is allowed by additional checking with a plurality of smart card drivers before communicating with the smart card, rather than simply using the first compatible smart card driver found. Furthermore, when employing an application available on the given smart card, a correct smart card driver is to be selected from among the plurality of smart card drivers. | 06-10-2010 |
20100241851 | SYSTEM AND METHOD FOR VALIDATING CERTIFICATE ISSUANCE NOTIFICATION MESSAGES - To validate a received certificate issuance notification message, a device may verify that the certificate issuance notification message conforms to expected norms or authenticate a signature associate with the certificate issuance notification message. Upon validating, the device may then transmit a uniform resource locator, extracted from the certificate issuance notification message, to a network entity configured for processing certificate issuance. | 09-23-2010 |
20100250939 | SYSTEM AND METHOD OF HANDLING ENCRYPTED BACKUP DATA - By using a symmetric key to encrypt mobile device data before transmitting the data to a backup location in a backup operation, access to the data, at the backup location, may be restricted. To facilitate later decryption of the backed up mobile device data, the mobile device may also transmit the symmetric key to the off-device location. However, to limit use of the symmetric key, the mobile device may encrypt the symmetric key using authentication data, before transmitting the encrypted symmetric key to the backup location. | 09-30-2010 |
20100310073 | SYSTEM AND METHOD OF CROSS-COMPONENT MESSAGE PROCESSING - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. | 12-09-2010 |
20110176747 | METHOD AND PORTABLE ELECTRONIC DEVICE FOR PROCESSING - A method and portable electronic device for processing images are provided. Images are stored electronically at a remote server as attachments to message data, message data received at the portable electronic device with indicators identifying corresponding attachments to the message data. The portable electronic device comprises a processing unit interconnected with an input device, and a display device. First input data is received indicative that one of the indicators, corresponding to one of the images, has been selected, causing the image to be retrieved from the remote server. The received image is displayed at the display device. Second input data is received indicative that a next one of the images is to be displayed, the second input data received while the first retrieved images is displayed at the display device. The next images is then received from the remote server and processed to display it at the display device. | 07-21-2011 |
20110179465 | APPARATUS, AND AN ASSOCIATED METHOD, FOR FACILITATING SECURE OPERATIONS OF A WIRELESS DEVICE - An apparatus, and an associated method, facilitates security at a wireless device, such as a wireless device comprising a mobile computing platform. A security decision engine is provided that monitors for an event necessitating a security decision. When a security decision is required, request is made of a knowledge fetcher, provided by a trusted third-party, installed at the wireless device for the security decision. The knowledge fetcher obtains the security decision, such as by obtaining the security decision from a remote, trusted third-party server, and provides the security decision to the decision engine. Use is made of the security decision pursuant to a setting for which the security decision is needed. | 07-21-2011 |
20110179468 | APPARATUS, AND AN ASSOCIATED METHOD, FOR FACILITATING SECURE OPERATIONS OF A WIRELESS DEVICE - An apparatus, and an associated method, facilitates security relating to installation of, such as downloading of, and application at a wireless device. When selection is made to install the application, a security decision is required of a trusted, third-party to install the application. A request is made of a trusted, third-party entity for the security decision. Responsive to the security decision, the application is either allowed to be downloaded to the wireless device or prohibited from being downloaded to the wireless device. | 07-21-2011 |
20110185186 | SYSTEM AND METHOD FOR PROTECTING DATA ON A MOBILE DEVICE - Methods and systems are disclosed for protecting data on a mobile device. A data protection module on the mobile device receives a transmission including a secret key. The secret key is used in encrypting data on the device and is then deleted. Subsequent to an event detectable to the mobile device, the data protection module receives another transmission including said secret key. The secret key is then used to decrypt the encrypted data. | 07-28-2011 |
20110246762 | System and Method for Exchanging Cryptographic Protocol Capabilities - In some data communication configurations, data received from a sender may need to be viewed or otherwise processed by more than one entity with a corresponding client. For example, a message sent to a corporate email address may be viewed by either or both a mobile device and a desktop device. For the sender to utilize the strongest algorithm or protocol used by the recipient, it would therefore need to know which algorithms or protocols are supported by both the mobile and desktop mail clients. A system and method are provided to enable the mobile device to know about the capabilities of related mail clients associated with the communication address (e.g. email address) and vice versa such that the intersection of the capabilities (i.e. the strongest algorithm or protocol supported by all parties involved) can be chosen and the messages or data cryptographically processed accordingly. | 10-06-2011 |
20110271331 | Assignment and Distribution of Access Credentials to Mobile Communication Devices - A server storing a pool of unassigned access credentials selects an access credential from the pool, assigns it to an individual, identifies a mobile communication device associated with the individual, and pushes the access credential to the mobile communication device over a secure and authenticated channel such that the access credential is receivable by the mobile communication device. If the mobile communication device supports a proximity technology and is proximate to an access node that supports the proximity technology, the mobile communication device employs the proximity technology to present the access credential to the access node. | 11-03-2011 |
20110299687 | AUTOMATED KEY MANAGEMENT SYSTEM AND METHOD - A system and method for automatic key and certificate management is disclosed. In particular, a key store in a base computer contains both new and previously viewed cryptographic keys. In one embodiment, for each new key, if a corresponding certificate matches an existing certificate, the new certificate may be automatically downloaded to a mobile communications device without prompting a user. | 12-08-2011 |
20110319074 | Method and apparatus for low cost cellular roaming - A wireless device (WD) is associated with a preprogrammed user roaming setting and an automated adjustment algorithm stored in operative communication with the device. The algorithm is initiated and run when the device enters a roaming area, thereby automatically activating the roaming setting. A user response query is operatively connected to the automated adjustment algorithm, and operates as a switch for the automated adjustment algorithm, which initiates changing the user settings in accordance with the roaming setting. A user available query is connected to the user response query, to determine if the wireless device is in use, and to generate a notification if the device is idle or a prompt if the device is in use. An output from the switch of the user response query selectively enables the automated adjustment algorithm responsive to at least one of a responsive and a nonresponsive input to the user response query. | 12-29-2011 |
20120042166 | METHOD AND DEVICE FOR AUTOMATICALLY DISTRIBUTING UPDATED KEY MATERIAL - A method for handling an encrypted message received on an electronic device that has not been encrypted using a current public key. The portable electronic device automatically generates a reply message to the sender in response to determining that the message has not been encrypted with the current public key. The reply message may contain the current public key of the recipient device, and may request the sender to resend the message encrypted with the current public key. | 02-16-2012 |
20120047212 | System and method for obtaining a portion of an archived email message - A first email message associated with a mobile communication device of a user is conveyed to a destination. The first email message comprises a forwarded portion of a second email message that has been previously archived by an email server associated with the user. The step of conveying comprises the step of obtaining the forwarded portion of the second email message without intervention of the user. | 02-23-2012 |
20120079593 | System and Method For Hindering a Cold Boot Attack - A method for hindering a cold boot attack on a user equipment (UE) is provided. The method includes, in response to detection of the cold boot attack, executing prioritized security procedures. A user equipment (UE) is also provided that includes a processor configured to execute prioritized security procedures responsive to detection of a cold boot attack. | 03-29-2012 |
20120110097 | Forwarding E-Mail Message Attachments From a Wireless Device - A system and method of forwarding an e-mail from a wireless device is provided. The wireless device receives the e-mail message in portions as needed, the portions having the attachments contained therein. The portions of the e-mail message containing only a subset of attachments associated with the e-mail message in the user mailbox. When a wireless device forwards the e-mail message to one or more recipients a message identifier and an attachment indicator is provided for identifying the number of attachments in the e-mail message to be forwarded. The identified e-mail message is retrieved and the attachments are extracted from the retrieved e-mail message based on the attachment indicator. The e-mail message is forwarded to the one or more recipients and the extracted attachments. | 05-03-2012 |
20120124375 | APPARATUS, SYSTEM AND METHOD FOR VERIFYING SERVER CERTIFICATES - A device and method are provided for a device that authenticates a server over a network. The device and method are operable to contact the server to initiate a handshaking operation. The device receives certificate information and handshaking information from the server. The device completes the handshaking operations to establish the connection with the server. The device downloads the content from the server through the connection before authenticating the server to establish a secure connection. In some aspects, the device may display a portion of the downloaded content before the server is authenticated. | 05-17-2012 |
20120137121 | METHOD AND DEVICE FOR STORING SECURED SENT MESSAGE DATA - Methods and devices for storing sent message data are described. The sent message data corresponds to a message sent to a destination by a communication device via a server. The method includes compiling a first portion of the message which has a plurality of components; applying security encoding to the first portion; and storing the first portion. The first portion includes at least one but not all of the plurality of components in the message, and pointers to the components not included in the first portion. | 05-31-2012 |
20120137368 | APPARATUS, SYSTEM AND METHOD FOR PREVENTING DATA LOSS - A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may access content from a server over a connection through the network. The device displays the content on a user interface of the device. The device detects information entered into a field of the displayed content and evaluates a security state of the device. If the security state is below a security threshold and, if the entered information is identified as protected information based on stored criteria, the device displaying a visual indication on the user interface. | 05-31-2012 |
20120159183 | METHOD AND APPARATUS FOR SECURING A COMPUTING DEVICE - A method and apparatus for securing a computing device are provided. A state of the computing device is determined, the state associated with a protection state. The computing device is automatically switching between a plurality of security levels at based on the state. | 06-21-2012 |
20120238206 | COMMUNICATIONS DEVICE PROVIDING NEAR FIELD COMMUNICATION (NFC) SECURE ELEMENT DISABLING FEATURES RELATED METHODS - A communications device may include a near field communication (NFC) device, at least one memory configured to store secure application data to be communicated via the NFC device and a secure element (SE) application programming interface (API) associated with the secure application data, and a processor coupled with the NFC device and the at least one memory. The processor may be configured to disable the SE API to prevent access to the secure application data based upon a security condition, and enable the SE API to allow access to the secure application data based upon a security restore event. | 09-20-2012 |
20120252359 | MOBILE WIRELESS COMMUNICATIONS DEVICE FOR SELECTING A PAYMENT ACCOUNT TO USE WITH A PAYMENT PROCESSING SYSTEM BASED UPON A MOVEMENT SENSOR OR IMAGE SENSOR AND ASSOCIATED METHODS - A mobile wireless communications device includes a near field communications (NFC) device, a motion sensing device, and a memory configured to store access information for each of a plurality of payment accounts. A processor cooperates with the NFC device, the motion sensing device, and the memory. The processor is configured to recognize a movement pattern based upon the motion sensing device, determine a given payment account from among the plurality thereof based upon the movement pattern, and send corresponding access information for the given payment account to a transaction terminal via the NFC device. In some applications, the processor may determine a given payment account from among the plurality thereof based upon an image associated with a transaction terminal and captured by an optical sensor, and send corresponding access information for the given payment account to the transaction terminal via the NFC device. | 10-04-2012 |
20120252360 | MOBILE WIRELESS COMMUNICATIONS DEVICE FOR SELECTING A PAYMENT ACCOUNT TO USE WITH A PAYMENT PROCESSING SYSTEM BASED UPON A MICROPHONE OR DEVICE PROFILE AND ASSOCIATED METHODS - A mobile wireless communications device may include a near field communications (NFC) device, a microphone, a memory configured to store access information for each of a plurality of payment accounts, and a processor cooperating with the NFC device, the microphone, and the memory. The processor may be configured to capture a sound using the microphone, determine a given payment account from among the plurality thereof based upon the sound, and send the corresponding access information for the given payment account to a transaction terminal via the NFC device. | 10-04-2012 |
20120290835 | SYSTEM AND METHOD FOR VALIDATING CERTIFICATE ISSUANCE NOTIFICATION MESSAGES - To validate a received certificate issuance notification message, a device may verify that the certificate issuance notification message conforms to expected norms or authenticate a signature associate with the certificate issuance notification message. Upon validating, the device may then transmit a uniform resource locator, extracted from the certificate issuance notification message, to a network entity configured for processing certificate issuance. | 11-15-2012 |
20120317609 | METHODS AND DEVICES FOR CONTROLLING ACCESS TO A COMPUTING RESOURCE BY APPLICATIONS EXECUTABLE ON A COMPUTING DEVICE - Methods and devices for controlling access to a computing resource by applications executable on a computing device are described herein. In one example embodiment, method comprises: identifying an application category with which one or more applications executable on the computing device is associated; providing one or more rules that specify whether the one or more applications associated with the application category are permitted to access the computing resource on the computing device; and transmitting the security policy to the computing device; wherein when the security policy is enforced at the computing device, access to the computing resource by the one or more applications executable on the computing device that are associated with the application category is controlled by the one or more rules. | 12-13-2012 |
20120317638 | METHOD AND DEVICES FOR MANAGING PERMISSION REQUESTS TO ALLOW ACCESS TO A COMPUTING RESOURCE - Methods and devices for managing permission requests to allow access to a computing resource are disclosed herein. In one example embodiment, the method comprises: for an application to be installed on the computing device, determining an application category that the application is associated with, and retrieving a common permissions list for the application category, wherein the common permissions list identifies at least one computing resource that applications associated with the application category are configured to access; during an installation of the application on the computing device, determining one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device; determining which computing resources, of the one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device, are not identified in the common permissions list; and for each computing resource that the application is configured to access when the application is executed on the computing device that is not identified in the common permissions list, providing, in a user interface of the computing device, a permission request to allow the application to access the computing resource. | 12-13-2012 |
20130013933 | System and Method for Protecting Data on a Mobile Device - Methods and systems are disclosed for protecting data on a mobile device. A data protection module on the mobile device receives a transmission including a secret key. The secret key is used in encrypting data on the device and is then deleted. Subsequent to an event detectable to the mobile device, the data protection module receives another transmission including said secret key. The secret key is then used to decrypt the encrypted data. | 01-10-2013 |
20130055379 | SYSTEM, DEVICE AND METHOD FOR AUTHENTICATION - A computing device and computing device implemented method for setting a security level of the computing device. The method may comprise the computing device presenting a challenge to a user of the computing device. The challenge requiring the user to register a password with the computing device. The computing device may receive the password through a user input interface of the computing device in response to the challenge. The computing device may process the received password to calculate a password strength value and evaluate the password strength value to assign the security level. In an aspect, the security level may assign a higher security level when the password strength value is relatively high. In an aspect, the security level may allow for an expanded range of user selectable security options when the password strength value is relatively high. | 02-28-2013 |