Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Neil Patrick Adams, Waterloo CA

Neil Patrick Adams, Waterloo CA

Patent application numberDescriptionPublished
20090109898SYSTEM AND METHOD FOR SELECTING A MESSAGE TRANSPORT FOR A MULTI-MODE COMMUNICATION DEVICE - The present disclosure relates to a system and method for selecting a network for use by a communication device to process a data transmission is provided. In the method, the following actions are conducted: tracking transmission characteristics of networks used by the device; maintaining a set of options for the device relating to the networks, including at least one option based on the transmission characteristics; utilizing a selected option identify a selected network to process the data transmission by the communication device; and processing the data transmission using the selected network.04-30-2009
20090144540CERTIFICATE MANAGEMENT WITH CONSEQUENCE INDICATION - A certificate management operation request is managed on a device, access to which is governed by an authentication certificate. Upon receiving a request to perform a certificate management operation on a certificate, a consequence of performing the certificate management operation is determined and the consequence is indicated via a user interface of the device. For example, anytime a user attempts to use a certificate management application to delete, distrust or revoke a certificate, it is determined whether the certificate meets certain criteria, such as the certificate being the authentication certificate or being in the certificate chain of the authentication certificate. If the certificate meets the criteria, the user may be notified of a lack of permission to perform the requested operation and the operation may be prevented from completing. Alternatively, the user may be permitted to confirm the instruction to perform the requested operation, and the operation may be completed.06-04-2009
20090161845ENHANCED PHONE CALL CONTEXT INFORMATION - While participating in a telephone call, a communication device displays information relating to the other party to the call, thereby providing a context for the call. In particular, a microprocessor executes a context module to perform a lookup in a database for data items related to a party to the call. The microprocessor then arranges the presentation references to some of the data items found in the databases on the display of the communication device. The data items references to which are presented on the display may include: Past Appointments, i.e., recent meetings associated with the contact; Future Appointments, i.e., upcoming meetings associated with the contact; and Messages, i.e., e-mail messages, SMS messages and Instant Messaging messages both to and from the contact.06-25-2009
20090171906SYSTEM AND METHOD FOR PROVIDING INFORMATION RELATING TO AN EMAIL BEING PROVIDED TO AN ELECTRONIC DEVICE - The invention relates to a system and method for associating an item in an electronic transmission with information. The system may be implemented in a server that associates information relating to an item embedded in an electronic transmission addressed to an electronic device. The server comprises: a first process to identify the item (and perhaps categorize it); a second process to execute a database search for additional information for the item; a third process to retrieve results from the search and associate the results with a new transmission for the item, the new transmission including data from the electronic transmission; and a fourth process to transmit the new transmission to the device.07-02-2009
20090188977OPTIMIZED SMART CARD DRIVER PERFORMANCE - By splitting a smart card driver into multiple components, with one component residing on the mobile communication device and another component residing on the smart card reader, the smart card reader driver component is enabled to do more than merely relay communication between the mobile communication device and the smart card. By transferring part of the communication handling of the smart card driver to the smart card reader, a reduction in communication over the connection between the smart card reader and mobile communication device advantageously results in a more efficient transaction.07-30-2009
20090190802Optimized biometric authentication method and system - An efficient exchange of messages in a system for authenticating access to a base device is facilitated through the selection of a particular biometric template from among a plurality of biometric templates. Rather than transmitting the template to a peripheral device, an indication of a location of the particular biometric template within the plurality of biometric templates is transmitted to the peripheral device. At the peripheral device, once the indication of the location and a biometric candidate are received, the particular biometric template may be located and compared to the biometric candidate. Finally, an indication of a result of the comparing may be transmitted to the base device.07-30-2009
20090193151Optimized Biometric Authentication Method and System - An efficient exchange of messages in a system for authenticating access to a base device is facilitated through the selection of a particular biometric template from among a plurality of biometric templates. Rather than transmitting the template to a peripheral device, an indication of a location of the particular biometric template within the plurality of biometric templates is transmitted to the peripheral device. At the peripheral device, once the indication of the location and a biometric candidate are received, the particular biometric template may be located and compared to the biometric candidate. Finally, an indication of a result of the comparing may be transmitted to the base device.07-30-2009
20090210729Automated Power Management of a Peripheral Device - Based on bounds of a period of reduced operation for a base device, a base device generates a power management message for transmission to a peripheral device. In the power management message, the base device inserts bounds of a period of reduced operation for the peripheral device. As a result, the periods of reduced operation conserve battery power in both devices and the two devices may reestablish a communications channel upon reaching the end of the period of reduced operation and resuming normal operations.08-20-2009
20090222657Methods And Apparatus For Use In Obtaining A Digital Certificate For A Mobile Communication Device - In one illustrative scenario, a mobile device receives configuration information which includes information for use in constructing a request message for obtaining a digital certificate from a certificate authority (CA). After receipt of the configuration information, the mobile device constructs the request message for the digital certificate and causes it to be sent to a host server of a communication network. In response, the host server requests and obtains the digital certificate from the CA on behalf of the mobile device, and thereafter “pushes” the received digital certificate to the mobile device. The mobile device receives the digital certificate and stores it for use in subsequent communications. The host server may be part of a local area network (LAN) which includes a wireless LAN (WLAN) adapted to authenticate the mobile device based on the digital certificate, so that the mobile device may obtain access to the WLAN.09-03-2009
20090222902Methods And Apparatus For Use In Enabling A Mobile Communication Device With A Digital Certificate - In one illustrative scenario, a mobile communication device causes a communication session to be established with a host server of a communication network. The mobile device performs communication operations in the communication session for activating a communication service, such as a data synchronization service, with the host server. In the communication session, the mobile device also receives configuration information which includes information for use in constructing a request message for obtaining a digital certificate from a certificate authority (CA). After receipt of the configuration information, the mobile device constructs the request message for the digital certificate and causes it to be sent to the host server. In response, the host server requests and obtains the digital certificate from the CA on behalf of the mobile device, and thereafter “pushes” the received digital certificate to the mobile device. The mobile device receives the digital certificate and stores it for use in subsequent communications. The host server may be part of a local area network (LAN) which includes a wireless LAN (WLAN) adapted to authenticate the mobile device based on the digital certificate, so that the mobile device may obtain access to the WLAN.09-03-2009
20090313705SECURITY MEASURES FOR COUNTERING UNAUTHORIZED DECRYPTION - After a predetermined limit for decryption attempts has been exceeded by a user attempting to decrypt an encrypted electronic message or attempting to decrypt a encrypted electronic certificate associated with an electronic message, access to the electronic message may be restricted.12-17-2009
20100085840ELECTRONIC DEVICE AND METHOD PROVIDING IMPROVED BEDTIME MODE OF OPERATION - An improved electronic device and method provide an improved clock feature that includes a BEDTIME mode that is initiated by execution of a BEDTIME mode routine. The BEDTIME mode comprises a number of features that are conducive to sleep by performing operations that minimize distractions to a user, and all such operations are initiated by execution of the BEDTIME mode routine.04-08-2010
20100085841ELECTRONIC DEVICE AND METHOD PROVIDING ACTIVATION OF AN IMPROVED BEDTIME MODE OF OPERATION - An improved electronic device and method provide an improved clock feature that includes a BEDTIME mode that is initiated by execution of a BEDTIME mode routine. The BEDTIME mode comprises a number of features that are conducive to sleep by performing operations that minimize distractions to a user, and all such operations are initiated by execution of the BEDTIME mode routine. The BEDTIME mode can be triggered in a variety of fashions, such as by setting an alarm or by docking the device with a predetermined other device such as a docking station.04-08-2010
20100085842ELECTRONIC DEVICE AND METHOD PROVIDING IMPROVED PROCESSING OF A PREDETERMINED CLOCK EVENT DURING OPERATION OF AN IMPROVED BEDTIME MODE - An improved electronic device and method provide an improved clock feature that includes a BEDTIME mode that is initiated by execution of a BEDTIME mode routine. The BEDTIME mode comprises a number of features that are conducive to sleep by performing operations that minimize distractions to a user, and all such operations are initiated by execution of the BEDTIME mode routine. The BEDTIME mode can be terminated, such as when an alarm time has been reached, thereby enabling any alarms that had been suspended, and therefore enabling the alarm clock function to output an alarm.04-08-2010
20100100728METHOD OF HANDLING A CERTIFICATION REQUEST - In a certification request, a user device includes an object identifier. When a certification authority generates an identity certificate responsive to receiving the certification request, the certification authority includes the object identifier, thereby allowing improved management of the identity certificate at the user device and elsewhere.04-22-2010
20100121725METHOD AND APPARATUS FOR CONTACTLESS PAYMENT AUTHENTICATION - The present disclosure relates generally to the authentication of contactless payments attempted by a device having embedded contactless payment functionality. In particular, the disclosure is directed to systems and methods that utilize authentication schemes that already exist on a device in which the contactless payment functionality is embedded. One example of such authentication schemes is the use of password protection to lock or unlock the device in which the contactless payment functionality is embedded. Using the password protection functionality may provide varying levels of authentication protection based on the desires of the user. A number of exemplary uses of such a method and apparatus are disclosed herein.05-13-2010
20100134248SIMPLIFIED BIOMETRIC CHARACTER SEQUENCE ENTRY - A device having a biometric input device is configured to allow a user to enter a character sequence for use in validation using the biometric input device. A predetermined assignment of characters to enrolled biometric templates allows a user to determine a sequence of biometric inputs to provide to enter an appropriate character sequence.06-03-2010
20100134274ANTICIPATORY RESPONSES TO COMMANDS - Responsive to intercepting an outbound command, a command interceptor may, upon determining that the command is associated with a particular category of commands, transmit an anticipatory response to the source of the command, for example, to prematurely indicate that the command has met with success. Accordingly, a given application whose further execution is dependent upon the successful completion of the command may further execute earlier than would be the case if the given application was to await the transmission of the command, the generation of a response indicating success and the receipt of the response indicating success.06-03-2010
20100138666SIMPLIFIED MULTI-FACTOR AUTHENTICATION - A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element.06-03-2010
20100138667AUTHENTICATION USING STORED BIOMETRIC DATA - A method is provided for storing a biometric template extracted a smart card for use on a user computing device. The biometric template is extracted from the smart card using a smart card reader. The biometric template is encrypted using a content protection key. The content protection key is encrypted using at least one of a device password or a smart card password. The password may be hashed. The encrypted biometric template, the encrypted content protection key and the hashed password may then be stored in a cache. A method for using the stored biometric template to access the user computer device is also provided.06-03-2010
20100138914SYSTEM AND METHOD OF PROVIDING BIOMETRIC QUICK LAUNCH - By providing a biometric candidate to a biometric input device, a user may cause a computing device to be unlocked and cause a specific application to be launched on the computing device. The biometric input device may be on the computing device or on a peripheral security device that is in communication with the computing device. Indeed, the specific application may be launched pre-loaded with certain data, selection of which data is controlled by the particular biometric provided to the biometric input device.06-03-2010
20100205425MULTI-LEVEL DATA STORAGE - Rather than storing all data in the same manner, e.g., an encrypted manner, a security level with which to associate received data of a given type may be determined. Subsequently, distinct types of data may be stored in a distinct manner, with the manner of storage having a security level appropriate to the type of data. For example, a first type of data may be stored in an encrypted manner (i.e., with a high level of security), while a second level of data may be stored in a plain text manner (i.e., with a low level of security).08-12-2010
20100217998System and Method for Managing Secure Registration of a Mobile Communications Device - In one embodiment, a method is provided for managing secure registration of a mobile communications device, the method comprising registering, at a network node, the mobile communications device using a first registration process, the first registration process requiring an authentication key associated with the mobile communications device; processing a request from the mobile communications device, the request including an indication that the mobile communications device is changing to a second registration process; and clearing the authentication key associated with the mobile communications device upon expiration of a time window.08-26-2010
20110096753Methods And Apparatus For Signal Monitoring In A Wireless Communication Network - Techniques in a mobile communication device for signal monitoring in a wireless communication network are described. The mobile device operates for communications over a communication channel of the wireless network. During operation, the mobile device periodically obtains measurements of signal quality of the communication channel at a rate R. In addition, the mobile device obtains a measurement of velocity or acceleration of the mobile device. In response to an increase in the measure of velocity or acceleration, the mobile device increases the rate R. Conversely, in response to a decrease in the measurement of velocity or acceleration, the mobile device decreases the rate R. The measurements of the signal quality may be used to determine whether to initiate a handover to a different wireless network. In one illustrative environment, the initial wireless network is a wireless local area network (WLAN), the other wireless network is a wireless wide area network (WWAN), the signal quality is a received signal strength indication (RSSI) of the communication channel, and the monitoring involves obtaining samples of the RSSI.04-28-2011
20110198397SECURE USE OF EXTERNALLY STORED DATA - A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response APDU, wherein the filtered response APDU does not include the authentication data. Beneficially, when the smart card reader transmits the filtered response APDU toward a destination, the biometric template data is less susceptible to interception, thereby providing a more secure solution.08-18-2011
20110211530System and Method for Securing a Personalized Indicium Assigned to a Mobile Communications Device - In one embodiment, a method operable on a mobile communications device is disclosed, the method comprising generating an authentication key for securing a personalized indicium assigned to the mobile communications device, wherein the personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with the mobile communications device; transmitting a registration request to a network node operable with a wireless network, the registration request having a registration request payload including the authentication key; receiving a challenge message from the network node, the challenge message generated when the network node detects a change of the IP address associated with the mobile communications device, and responsive to receiving the challenge message, executing a challenge response including an authentication value of a challenge string transmitted in the challenge message, wherein the authentication value is created using the authentication key.09-01-2011
20120042018SYSTEM AND METHOD FOR MESSAGE DELIVERY - A method of receiving an email message using a communication network is presented. The method includes identifying an email message to be retrieved from a server. The email message is a multi-part message and includes content having two or more content types. The method includes determining a first content type to be retrieved from the server. The first content type includes non-plain-text content. The method includes retrieving content of the email message having the first content type from the server using the communication network, presenting the content having the first content type, and, after retrieving the content having the first content type from the server, retrieving content of the email message having a second content type from the server. The method includes verifying a digital signature associated with the email message.02-16-2012
20120078676MEETING ROOM SCHEDULING SYSTEM INCLUDING ROOM OCCUPANCY SENSOR AND RELATED METHODS - A meeting room scheduling system may include at least one room occupancy sensor configured to be positioned within the meeting room and a controller coupled to the at least one room occupancy sensor. The controller may be configured to schedule periodic meetings for the meeting room with a requested meeting time, and determine actual occupancy times of the meeting room over a plurality of the periodic meetings based upon the at least one room occupancy sensor. The controller may also be configured to reschedule remaining ones of the periodic meetings with a rescheduled meeting time based upon the determined actual occupancy times being different than the requested meeting time.03-29-2012
20120080521METHOD, SYSTEM AND MOBILE DEVICE EMPLOYING ENHANCED FINGERPRINT AUTHENTICATION - The described embodiments relate generally to methods and systems for fingerprint authentication for a computing device. In one embodiment, the method comprises: storing a default finger swipe scan direction; receiving a finger swipe scan; authenticating the received finger swipe scan; determining a received finger swipe scan direction; and configuring the default finger swipe scan direction. The computing device may comprise a mobile device.04-05-2012
20120084587Automated Power Management of a Peripheral Device - Based on bounds of a period of reduced operation for a base device, a base device generates a power management message for transmission to a peripheral device. In the power management message, the base device inserts bounds of a period of reduced operation for the peripheral device. As a result, the periods of reduced operation conserve battery power in both devices and the two devices may reestablish a communications channel upon reaching the end of the period of reduced operation and resuming normal operations.04-05-2012
20120102195SYSTEM AND METHOD FOR PROVIDING INFORMATION RELATING TO AN EMAIL BEING PROVIDED TO AN ELECTRONIC DEVICE - The disclosure relates to a system and method for associating an item in an electronic transmission with information. The system may be implemented in a server that associates information relating to an item embedded in an electronic transmission addressed to an electronic device. The server comprises: a first process to identify the item (and perhaps categorize it); a second process to execute a database search for additional information for the item; a third process to retrieve results from the search and associate the results with a new transmission for the item, the new transmission including data from the electronic transmission; and a fourth process to transmit the new transmission to the device.04-26-2012
20120128156CROSS-COMPONENT CRYPTOGRAPHIC MESSAGE SYNTAX MESSAGE CONSTRUCTION - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for confidentiality or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, construct a cryptographic message syntax message.05-24-2012
20120131116CONTROLLING DATA TRANSFER ON MOBILE DEVICES - A communication system can provide one or more mechanisms for controlling data transfer on a mobile device. A technique based on such a mechanism includes receiving a request to transfer data to an application, accessing a first service identifier associated with the data, accessing a second service identifier associated with a service mode of the application, and determining whether to allow a transfer of the data to the application based on the first service identifier and the second service identifier.05-24-2012
20120131346SECURING PRIVATE KEY ACCESS FOR CROSS-COMPONENT MESSAGE PROCESSING - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, sign the composite message. Since signing the composite message involves access to a private key, access to that private key is secured such that such access to the private key can only be arranged responsive to an explicit request for a hash that is to be signed using the private key.05-24-2012
20120140927CROSS-COMPONENT MESSAGE ENCRYPTION - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, encrypt and sign the composite message. Conveniently, security considerations are maintained even in view of bandwidth optimization measures.06-07-2012
20120159583VISUAL OR TOUCHSCREEN PASSWORD ENTRY - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and movement of either the modified base image or modified overlay image is permitted if a criterion for movement is met. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image.06-21-2012
20120159592MULTI-LAYERED COLOR-SENSITIVE PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and at least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image and selection of a color for a portion of the display that matches a pre-selected color.06-21-2012
20120159593MULTI-LAYER ORIENTATION-CHANGING PASSWORD - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and at least one of the modified base image and modified overlay image is moved by the user. In addition to the moving, a change in orientation of at least one of the modified base image and the modified overlay image is required. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image and the change in orientation matching a pre-selected orientation criterion.06-21-2012
20120159594ADJUSTING THE POSITION OF AN ENDPOINT REFERENCE FOR INCREASING SECURITY DURING DEVICE LOG-ON - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and with each execution of the method, at least one of a position of a pre-selected base image reference point on the modified base image and a position of a pre-selected overlay image reference point on the modified overlay image is varied. Positive authentication is indicated in response to an input resulting in the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image.06-21-2012
20120159608PASSWORD ENTRY USING 3D IMAGE WITH SPATIAL ALIGNMENT - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned, at least one of the base image reference point and the overlay image reference point having coordinates in three dimensions.06-21-2012
20120159609PASSWORD ENTRY USING MOVING IMAGES - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method, an authentication video is displayed on a display. In response to receiving an input at a point in time in the video that matches a pre-selected time reference point, positive authentication is indicated.06-21-2012
20120159613MULTI-LAYER MULTI-POINT OR RANDOMIZED PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response a first point relative to the base image reference point being aligned with a second point relative to the overlay image reference point.06-21-2012
20120159614SIMPLE ALGEBRAIC AND MULTI-LAYER PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. The modified overlay image comprises a plurality of numbers. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned, in sequence, with two or more numbers from the overlay image that equal a pre-selected algebraic result when one or more algebraic operator is apply to the numbers.06-21-2012
20120159615MULTI-LAYER MULTI-POINT OR PATHWAY-BASED PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and at least one of the modified base image and modified overlay image is moved by the user. In addition to the moving, a change in orientation of at least one of the modified base image and the modified overlay image is required. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image after moving through at least one other pre-selected reference point.06-21-2012
20120159616PRESSURE SENSITIVE MULTI-LAYER PASSWORDS - A method of authenticating a user of a computing device is proposed, together with a computer readable medium and a computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and either the modified base image or modified overlay image is moved by the user. Positive authentication is indicated in response to alignment of a base image reference point and an overlay image reference point and an indication of a correct level of pressure applied to a pressure sensitive input device.06-21-2012
20120233252HANDLING RECEIPTS IN CROSS COMPONENT MESSAGE PROCESSING - By automatically obtaining the entirety of a received message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, sign the composite message. In both the above contexts, handling message receipts when message processing ahead of message transmission involved more than one component may be facilitated by storing appropriate expected receipt content during the message processing, either on the device or the server. Validation of the receipt can then be accomplished through use of the stored expected receipt content in a manner that retains the benefits of message processing ahead of message transmission that involves more than one component.09-13-2012
20120233681METHOD AND SYSTEM OF USER AUTHENTICATION USING A PORTABLE AUTHENTICATOR - Systems and methods are provided for facilitating access to an electronic device. Password information is stored on the electronic device, and on a portable authenticator. When a user attempts to access the electronic device, the user is prompted to enter a password at the electronic device. The portable authenticator determines the validity of the entered password. The electronic device receives the results of the validity determination from the portable authenticator, and provides access to the electronic device based on the received validity determination.09-13-2012
20120260097SYSTEM AND METHOD OF SIGNING A MESSAGE - A system and method of signing a message to be sent from a first communication device to a destination via a second communication device. The message includes a first portion on the first communication device and a second portion on the second communication device. The method includes receiving at the second communication device the first portion of the message and a first signature for the first portion from the first communication device; combining the first portion and the second portion to form the message; obtaining a second signature for the message; and sending the first signature, the second signature and the message from the second communication device to the destination.10-11-2012
20120278620Forwarding E-Mail From A Wireless Device - A system and method of sending an e-mail message associated with a wireless device is provided. A request to forward or reply to an original e-mail message is sent from the wireless device to a server. The request contains one or more recipients and includes a message identifier of an original e-mail message. A portion indicator is provided for retrieving portions of the original e-mail message identified by the message identifier. An e-mail message is sent to the one or more recipients comprising any added user text and the one or more retrieved portions of the original e-mail message such that text of the original message that the user may not be aware is not forwarded to new recipients.11-01-2012
20120282880METHOD AND APPARATUS FOR UNLOCKING A MOBILE COMMUNICATION DEVICE - A method and apparatus for unlocking a mobile communication device are provided, the mobile communication device comprising an input device, and a display device, the mobile communication device enabled to initiate emergency calls in a locked state. Password input data is received via the input device, when the mobile communication device is in the locked state, the password input data for unlocking the mobile communication device, the password input data comprising at least a sequence of characters for initiating an emergency call. In response to receiving the sequence of characters for initiating the emergency call, the display device is controlling to provide a representation of instructions to initiate the emergency call upon receipt of emergency call initiate data from the input device.11-08-2012
20120286039SECURE USE OF EXTERNALLY STORED DATA - A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response APDU, wherein the filtered response APDU does not include the authentication data. Beneficially, when the smart card reader transmits the filtered response APDU toward a destination, the biometric template data is less susceptible to interception, thereby providing a more secure solution.11-15-2012
20120310835METHOD AND APPARATUS FOR CONTACTLESS PAYMENT AUTHENTICATION - The present disclosure relates generally to the authentication of contactless payments attempted by a device having embedded contactless payment functionality. In particular, the disclosure is directed to systems and methods that utilize authentication schemes that already exist on a device in which the contactless payment functionality is embedded. One example of such authentication schemes is the use of password protection to lock or unlock the device in which the contactless payment functionality is embedded. Using the password protection functionality may provide varying levels of authentication protection based on the desires of the user. A number of exemplary uses of such a method and apparatus are disclosed herein.12-06-2012
20120326861ANTICIPATORY RESPONSES TO COMMANDS - Responsive to intercepting an outbound command, a command interceptor may, upon determining that the command is associated with a particular category of commands, transmit an anticipatory response to the source of the command, for example, to prematurely indicate that the command has met with success. Accordingly, a given application whose further execution is dependent upon the successful completion of the command may further execute earlier than would be the case if the given application was to await the transmission of the command, the generation of a response indicating success and the receipt of the response indicating success.12-27-2012
20130002421Electronic Device and Method Providing Activation of an Improved Bedtime Mode of Operation - An improved electronic device and method provide an improved clock feature that includes a BEDTIME mode that is initiated by execution of a BEDTIME mode routine. The BEDTIME mode comprises a number of features that are conducive to sleep by performing operations that minimize distractions to a user, and all such operations are initiated by execution of the BEDTIME mode routine. The BEDTIME mode can be triggered in a variety of fashions, such as by setting an alarm or by docking the device with a predetermined other device such as a docking station.01-03-2013
20130007876SYSTEM AND METHOD OF PROVIDING BIOMETRIC QUICK LAUNCH - By providing a biometric candidate to a biometric input device, a user may cause a computing device to be unlocked and cause a specific application to be launched on the computing device. The biometric input device may be on the computing device or on a peripheral security device that is in communication with the computing device. Indeed, the specific application may be launched pre-loaded with certain data, selection of which data is controlled by the particular biometric provided to the biometric input device.01-03-2013
20130008955System and Method of Multiple Smart Card Driver Support - By thoroughly investigating compatibility of a plurality of smart card drivers to applications available on a given smart card, a smart card framework module may be afforded additional flexibility in communications with the smart card. The additional flexibility is allowed by additional checking with a plurality of smart card drivers before communicating with the smart card, rather than simply using the first compatible smart card driver found. Furthermore, when employing an application available on the given smart card, a correct smart card driver is to be selected from among the plurality of smart card drivers.01-10-2013
20130009748SIMPLIFIED BIOMETRIC CHARACTER SEQUENCE ENTRY - A device having a biometric input device is configured to allow a user to enter a character sequence for use in validation using the biometric input device. A predetermined assignment of characters to enrolled biometric templates allows a user to determine a sequence of biometric inputs to provide to enter an appropriate character sequence.01-10-2013
20130031362METHOD OF HANDLING A CERTIFICATION REQUEST - In a certification request, a user device includes an object identifier. When a certification authority generates an identity certificate responsive to receiving the certification request, the certification authority includes the object identifier, thereby allowing improved management of the identity certificate at the user device and elsewhere.01-31-2013
20130041830METHODS AND APPARATUS TO PROVISION PAYMENT SERVICES - Methods and apparatus to provision payment services are disclosed. An example method includes receiving an indication of a service to be provisioned to a mobile device, generating a token indicative of the service, wherein the token includes a cryptographically signed portion that was cryptographically signed by a secure element of the mobile device, sending the token to an entity for verification, and provisioning the service when the token is verified.02-14-2013
20130045714PORTABLE WIRELESS COMMUNICATIONS DEVICE INCLUDING PICKPOCKET NOTIFICATION AND RELATED METHODS - A portable wireless communications device to be carried by a holster includes a portable housing carrying a wireless transceiver, a holster sensor, a local alert indicator, a user authentication input device, and a controller. The controller may store data and is connected to the wireless transceiver, the holster sensor, the local alert indicator, and the user authentication input device. The controller may be switchable to a pickpocket mode for activating the local alert indicator, wirelessly sending at least one remote alert message, and rendering unusable at least a portion of the stored data upon removal from the holster unless a user authentication is input before expiration of a predetermined time.02-21-2013
20130103944Hypertext Link Verification In Encrypted E-Mail For Mobile Devices - A method, device and computer readable memory are provided for verifying hypertext links in an encrypted e-mail message to be sent to a mobile device to remove links that may contain malicious programs, link to a phishing website, or potentially comprise security of the mobile device or expose the user to unsafe sites or content. The hypertext links are extracted by decrypting the encrypted e-mail message. The hypertext links from the decrypted e-mail message are extracted and for each link the status is determined to verify the link. Actions can then be performed based upon the determined status of respective extracted hypertext links.04-25-2013
20130104196RESTRICTING ACCESS TO HARDWARE FOR WHICH A DRIVER IS INSTALLED ON A COMPUTER - Users of a computer are prevented from directly accessing certain hardware for which a driver is installed on the computer. The users are provided a limited, indirect manner to access the hardware for a specific purpose or to do a specific job. One example of such hardware is a wireless hardware communication interface. The wireless activity of the computer may be restricted so that the wireless hardware communication interface is prevented from communicating with any devices compatible with the wireless hardware communication interface other than one or more specific devices.04-25-2013
20130114808SYSTEM AND METHOD FOR PROVIDING AN INDICATION OF RANDOMNESS QUALITY OF RANDOM NUMBER DATA GENERATED BY A RANDOM DATA SERVICE - A system and method for providing an indication of randomness quality of random number data generated by a random data service. The random data service may provide random number data to one or more applications adapted to generate key pairs used in code signing applications, for example. In one aspect, the method comprises the steps of: retrieving random number data from the random data service; applying one or more randomness tests to the retrieved random number data to compute at least one indicator of the randomness quality of the random number data; associating the at least one indicator with at least one state represented by a color; and displaying the color associated with the at least one indicator to a user. The color may be displayed in a traffic light icon, for example.05-09-2013
20130132732SIMPLIFIED MULTI-FACTOR AUTHENTICATION - A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element.05-23-2013
20130133065SYSTEM AND METHOD OF INDICATING THE STRENGTH OF ENCRYPTION - A method and system are provided for secure messaging on mobile computing devices. The method and system provide for an indication of a security trust level associated with a security method used with an electronic message.05-23-2013
20130138951METHOD AND DEVICE FOR AUTOMATICALLY DISTRIBUTING UPDATED KEY MATERIAL - A method for handling an encrypted message received on an electronic device that has not been encrypted using a current public key. The portable electronic device automatically generates a reply message to the sender in response to determining that the message has not been encrypted with the current public key. The reply message may contain the current public key of the recipient device, and may request the sender to resend the message encrypted with the current public key.05-30-2013
20130152185TRANSACTION PROVISIONING FOR MOBILE WIRELESS COMMUNICATIONS DEVICES AND RELATED METHODS - A mobile communications device may include a memory, a transceiver, and a controller coupled with the memory and the transceiver. The controller may be capable of receiving first authentication data from a security token via communication with the security token, where the first authentication data is associated with an account. The controller may also be capable of transmitting the first authentication data via the transceiver, and receiving second authentication data via the transceiver, where the second authentication data is also associated with the account. The controller may be further capable of storing the second authentication data in the memory, and transmitting a transaction request using the second authentication data.06-13-2013
20130152213APPARATUS, SYSTEM AND METHOD FOR PREVENTING DATA LOSS - A device and method are provided for a device that communicates security information to a user entering content into the device. In an aspect, the device may access content from a server over a connection through the network. The device displays the content on a user interface of the device. The device detects information entered into a field of the displayed content and evaluates a security state of the device. If the security state is below a security threshold and, if the entered information is identified as protected information based on stored criteria, the device displaying a visual indication on the user interface.06-13-2013
20130160091SYSTEM AND METHOD FOR ASSOCIATING MESSAGE ADDRESSES WITH CERTIFICATES - A system and method for associating message addresses with certificates, in which one or more message addresses are identified and associated with a user-selected certificate that does not contain any e-mail addresses. In certain situations, a message may be encrypted using a certificate that does not contain an e-mail address that matches the e-mail address of the individual to which the message is to be sent, so long as the address to which the message is to be sent matches any of the message addresses associated with the certificate. The message addresses are saved in a data structure that resides in a secure data store on a computing device, such as a mobile device.06-20-2013
20130166899METHOD AND SYSTEM FOR CONTROLLING SYSTEM SETTINGS OF A COMPUTING DEVICE - Methods and devices for controlling system settings of a computing device are described herein. One example embodiment comprises: determining configuration data associated with a software application, wherein the configuration data identifies one or more new system settings to be temporarily enforced on the computing device during an execution of the software application, and wherein the configuration data is digitally signed; and in response to an initiation of the execution of the software application, reconfiguring system settings on the computing device; wherein the reconfiguring comprises verifying at least one digital signature associated with the digitally signed configuration data; wherein if the at least one digital signature associated with the digitally signed configuration data successfully verifies, then the reconfiguring further comprises temporarily enforcing new system settings for the duration of the execution of the software application.06-27-2013
20130166908SYSTEM AND METHOD OF PROTECTING DATA ON A COMMUNICATION DEVICE - A system and method of protecting data on a communication device are provided. Data received when the communication device is in a first operational state is encrypted using a first cryptographic key and algorithm. When the communication device is in a second operational state, received data is encrypted using a second cryptographic key and algorithm. Received data is stored on the communication device in encrypted form.06-27-2013
20130166915SECURE TEXT-TO-SPEECH SYNTHESIS IN PORTABLE ELECTRONIC DEVICES - A method for secure text-to-speech conversion of text using speech or voice synthesis that prevents the originator's voice from being used or distributed inappropriately or in an unauthorized manner is described. Security controls authenticate the sender of the message, and optionally the recipient, and ensure that the message is read in the originator's voice, not the voice of another person. Such controls permit an originator's voiceprint file to be publicly accessible, but limit its use for voice synthesis to text-based content created by the sender, or sent to a trusted recipient. In this way a person can be assured that their voice cannot be used for content they did not write.06-27-2013
20130171929MOBILE COMMUNICATIONS DEVICE PROVIDING NEAR FIELD COMMUNICATION (NFC) CARD ISSUANCE FEATURES AND RELATED METHODS - A communications system may include a provisioning terminal comprising a first near field communications (NFC) device, where the provisioning terminal is capable of communicating with a provisioning server. The system may further include a mobile communications device comprising a second NFC device, a processor capable of providing a mobile wallet interface, a memory, and a memory controller coupled with the second NFC device, the memory, and the processor. The memory controller may be capable of receiving an applet and associated mobile wallet interface data from the provisioning server via the provisioning terminal based upon NFC communication between the first NFC device and the second NFC device, storing the applet and the associated mobile wallet interface data in the memory, and sending the mobile wallet interface data from the memory to the processor for the mobile wallet interface.07-04-2013
20130172054SYSTEMS AND METHODS FOR PRESENTING AN IMAGE ON A DISPLAY OF A MOBILE DEVICE - The described embodiments relate generally to methods, systems and handheld electronic communications devices for selecting and displaying a caller ID image from an image database configured to respond to user input and selectively display images on a display. The image database stores at least one tag identifier data corresponding to each image. An address book database stores at least one individual identifier and at least one corresponding address. A caller ID image corresponding to at least one caller ID is selected from the images and displayed on the display.07-04-2013
20130173455MOBILE COMMUNICATIONS DEVICE PROVIDING NEAR FIELD COMMUNICATION (NFC) SECURITY FEATURES AND RELATED METHODS - A mobile communications device may include a near field communication (NFC) device, a movement determining device, and a processor coupled with the NFC device and the movement determining device. The processor may be capable of selectively switching between a first operating mode, in which the NFC device is enabled for NFC communication, and an second operating mode. The processor may also be capable of, when switched to the unsecure operating mode, enabling the NFC device for NFC communication until the mobile communications device moves beyond a threshold distance based upon the movement determining device.07-04-2013
20130208590SYSTEM AND METHOD FOR SELECTING A MESSAGE TRANSPORT FOR A MULTI-MODE COMMUNICATION DEVICE - The present disclosure relates to a system and method for selecting a network for use by a communication device to process a data transmission. In the method, the following actions are conducted: tracking transmission characteristics of networks used by the device; maintaining a set of options for the device relating to the networks, including at least one option based on the transmission characteristics; utilizing a selected option identify a selected network to process the data transmission by the communication device; and processing the data transmission using the selected network.08-15-2013
20130227360Method and Apparatus for Providing Intelligent Error Messaging - A method and apparatus for providing intelligent error messaging is disclosed wherein a user of a mobile communications device is provided with descriptive error messaging information to assist the user in overcoming errors associated with the processing of electronic messages and data.08-29-2013
20130228621ALERTING A SMART CARD READER OF PROBABLE WIRELESS COMMUNICATION - A wireless device may alert a wireless smart card reader that communication of data between the wireless device and the wireless smart card reader is probably imminent by sending an activation alert. Upon receipt of the activation alert, if the wireless smart card reader is in a low-power state, the wireless smart card reader may enter a higher-power state. If the wireless smart card reader is in the higher-power state upon receipt of the activation alert, the wireless smart card reader may remain in the higher-power state until a timeout period has expired. The wireless device may instruct the wireless smart card reader to enter the low-power state by sending a deactivation alert if the wireless device detects that communication of data between the wireless device and the wireless smart card reader is not likely to occur within a specified period of time.09-05-2013
20130238914AUTOMATED POWER MANAGEMENT OF A PERIPHERAL DEVICE - Based on bounds of a period of reduced operation for a base device, a base device generates a power management message for transmission to a peripheral device. In the power management message, the base device inserts bounds of a period of reduced operation for the peripheral device. As a result, the periods of reduced operation conserve battery power in both devices and the two devices may reestablish a communications channel upon reaching the end of the period of reduced operation and resuming normal operations.09-12-2013
20130239016SCHEDULING EVENTS FROM ELECTRONIC MESSAGES - Scheduling an event on an electronic communications device configured for sending and receiving electronic messages over a communications network, including extracting information from an electronic message at the communications device; displaying on a display of the communications device an event scheduling interface for scheduling an event, the event scheduling interface having a plurality of input fields for receiving information about the event; and automatically populating at least one of the input fields in dependence on the extracted information.09-12-2013
20130239202METHOD, SYSTEM AND MOBILE DEVICE EMPLOYING ENHANCED USER AUTHENTICATION - The described embodiments relate generally to methods and systems for user authentication for a computing device. In one embodiment, the method comprises: enabling receipt of input in relation to selection of a plurality of authenticators for consecutive use by the computing device to authenticate a user; and storing reference information identifying the selected plurality of authenticators in a memory of the computing device. The computing device may comprise a mobile device.09-12-2013
20130239225Deleting Confidential Information Used to Secure a Communication Link - A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link. The conditions include general timeout, device inactivity, loss of connection over the communication link, a decline in signal strength, and a predefined number of transactions having occurred between the first device and the second device.09-12-2013
20130246547SYSTEMS AND METHODS FOR PROTECTING HEADER FIELDS IN A MESSAGE - Embodiments of the systems and methods described herein facilitate the transmitting, receiving, and processing of encoded messages wherein the header fields in the message header are protected. In one embodiment, the contents of the header fields to be protected are inserted into the message body as one or more additional lines of text, for example, prior to encoding and transmitting the message to a message recipient. Upon receipt of the message, the message recipient processes the encoded message such that the contents of the protected header fields can be extracted from the message body. Accordingly, by inserting the contents of the header fields to be protected into the message body, the header fields may be protected using existing standards and protocols for facilitating secure message communication.09-19-2013
20130246549SYSTEM AND METHOD FOR SELECTING MESSAGING SETTINGS ON A MESSAGING CLIENT - A system and method of selecting messaging settings on a messaging client are provided. A display configured to operate in conjunction with the messaging client displays a compose screen that includes a message portion and a messaging settings portion when an outgoing message is to be composed on the messaging client. Messaging settings selected to control message characteristics of the outgoing message are displayed in the messaging settings portion of the compose screen.09-19-2013
20130247143SYSTEM AND METHOD FOR CONFIGURING DEVICES FOR SECURE OPERATIONS - Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices. Security mode configuration data is used in establishing a security-related mode of operation for the computing devices.09-19-2013
20130254437System and Method for Handling Peripheral Connections to Mobile Devices - Systems and methods for establishing a data connection between a mobile device and a peripheral. The mobile device is configured to determine whether to handle user approval of the data connection between the mobile device and the peripheral. Through the mobile device, an input mechanism is provided for the user to provide input. The input is used in determining whether to approve the data connection between the mobile device and the peripheral.09-26-2013
20130268815METHOD AND SYSTEM FOR DETERMINING SUPPORT FOR A MEMORY CARD - Embodiments related to methods and systems for determining support for a memory card, where the memory card is accessible to a card reader and the card reader is in communication with an accessing device. One embodiment comprises transmitting a first test command to the memory card, receiving a response to the first test command, and determining that the response to the first test command indicates that a card type is not supported by a plurality of card drivers. In response to said determining, at least one additional test command specific to a card type supported by a selected card driver is automatically transmitted, and if the response is successful, the selected card driver, which was previously determined not to support the card type of the memory card, is indicated to support the card type of the memory card.10-10-2013
20130270343METHOD, SYSTEM AND SMART CARD READER FOR MANAGEMENT OF ACCESS TO A SMART CARD - The described embodiments relate generally to devices, methods and systems for managing access to a memory card, such as a smart card, by a plurality of accessing devices. Certain embodiments relate to a smart card reader (SCR) for managing concurrent access to a smart card by a plurality of accessing devices, the SCR comprising: a processor; a channel manager responsive to the processor for interfacing with the smart card; a communication interface responsive to the channel manager for communicating with the plurality of accessing devices; and wherein, when a session is open on a first channel between a first accessing device and the smart card and the channel manager is configured to issue an open channel command to the smart card to cause the smart card to open a second channel between the smart card and the second accessing device in response to the session request.10-17-2013
20130282848SYSTEMS AND METHODS FOR PROTECTING HEADER FIELDS IN A MESSAGE - Embodiments of the systems and methods described herein facilitate the transmitting, receiving, and processing of encoded messages wherein the header fields in the message header are protected. In one embodiment, the contents of the header fields to be protected are inserted into the message body as one or more additional lines of text, for example, prior to encoding and transmitting the message to a message recipient. Upon receipt of the message, the message recipient processes the encoded message such that the contents of the protected header fields can be extracted from the message body. Accordingly, by inserting the contents of the header fields to be protected into the message body, the header fields may be protected using existing standards and protocols for facilitating secure message communication.10-24-2013
20130283054SYSTEM , METHOD AND APPARATUS FOR OPTIMIZING WIRELESS COMMUNICATIONS OF SECURE E-MAIL MESSAGES WITH ATTACHMENTS - A system, method and apparatus are provided for secure e-mail message attachment optimization. Content attached to e-mail messages may not be suited to the resource constraints of the destination wireless device. In secure e-mail messages, the message may be signed and/or encrypted. A wireless server can determine resource parameters associated with a destination wireless device, such as display resolution, memory capacity, processor speed, and wireless interface constraints and re-scale the attached content to be optimized for delivery and presentation on the wireless device.10-24-2013
20130286573PORTABLE ELECTRONIC DEVICE INCLUDING VIRTUAL KEYBOARD AND METHOD OF CONTROLLING SAME - A method includes displaying a keyboard on a display of an electronic device, detecting a tilt of the device, and when the detected tilt is associated with a keyboard transformation function, resizing one or keys of the keyboard.10-31-2013
20130288646SYSTEM AND METHOD FOR HANDLING MESSAGE RECEIPT NOTIFICATION - Systems and methods for operation upon a wireless mobile device to handle message notifications. A method can include receiving a message by the wireless mobile device over a wireless communications network. The received message is processed so that at least a portion of the sender's message is displayed to a user of the wireless mobile device before a signed receipt is provided to the sender.10-31-2013
20130290455SYSTEM AND METHOD FOR IMAGE INCLUSION IN E-MAIL MESSAGES - While populating an e-mail message with, among other details, an e-mail address for a receiver, an image of the sender is included as part of the e-mail message. Advantageously, at a device in use to execute an e-mail client application on behalf of the receiver, the e-mail client application may automatically add the included image to an address book entry associated with the identity of the sender. Alternatively, the user may be prompted to allow the association of the image with the address book entry of the sender of the message. Later, upon receiving an incoming call from the sender with corresponding CLID information, the call display application may perform a lookup of the CLID information and display the image associated, in the address book, with the sender.10-31-2013
20130305180Device And Method For Improving Efficiency Of Entering A Password Using A Key-Limited Keyboard - A method is provided for reducing a number of keys that a user is required to depress on a device having a keyboard with a limited number of keys when the user enters a password. The method comprising the following steps. A subset of characters used to define the password is determined. A filter to apply to the keyboard is determined in accordance with the determined subset of characters. The filter is applied when the user depresses the keys. Devices: and computer readable medium for implementing the method arc also provided.11-14-2013
20130318344SYSTEM AND METHOD FOR PROCESSING ENCODED MESSAGES FOR EXCHANGE WITH A MOBILE DATA COMMUNICATION DEVICE - A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device, the message is processed so as to modify the message with respect to one or more encryption and/or authentication aspects. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a host system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the host system to one or more receivers.11-28-2013
20130326552METHODS AND DEVICES FOR PROVIDING COMPANION SERVICES TO VIDEO - Methods and devices for providing companion services to video are described. In one example embodiment, the method includes: identifying text contained within a video; determining, by performing pattern matching, if the identified text in the video contains actionable text; and if the identified text in the video contains actionable text, providing access to one or more features based on the actionable text.12-05-2013
20130326614SYSTEM AND METHOD FOR CONTROLLING ACCESS TO SECURE RESOURCES - A system and method for controlling access to a secure resource in a device are disclosed. In some embodiments, the device may include a processor capable of receiving a first request from a first application of a plurality of applications executable by the processor, where the first request requests access to the secure resource, and the first request identifies the plurality of applications. In response to the first request, the processor is capable of generating a ticket associated with the secure resource and with each of the plurality of applications, and then storing the ticket in a memory. After receiving a second request from a second application requesting access to the secure resource, the processor is capable of granting the second application access to the secure resource, if the ticket associated with the secure resource exists and if the ticket is associated with the second application.12-05-2013
20130340049SYSTEM AND METHOD FOR PRIVILEGE MANAGEMENT AND REVOCATION - The present disclosure relates generally to the management of privileges associated with certain applications that are accessible by users of electronic equipment, such as, for example, networked computers, mobile wireless communications devices, and the like. In a broad aspect, a method for managing privileges associated with applications comprises: monitoring a plurality of electronic devices within a system; detecting a change in privileges associated with one or more applications resident on the plurality of electronic devices, wherein one or more privileges that are to be revoked are identified; and in response to a detection of the change in privileges, revoking the one or more privileges, such that each of the one or more applications resident on the plurality of electronic devices no longer has access to the one or more privileges.12-19-2013
20140013121METHOD AND DEVICE FOR STORING SECURED SENT MESSAGE DATA - Methods and devices for storing sent message data are described. The sent message data corresponds to a message sent to a destination by a communication device via a server. The method includes compiling a first portion of the message which has a plurality of components; applying security encoding to the first portion; and storing the first portion. The first portion includes at least one but not all of the plurality of components in the message, and pointers to the components not included in the first portion. A method of verifying sent message data on a communication device is also described.01-09-2014
20140027508Controlling Connectivity of a Wireless-Enabled Peripheral Device - A system includes a wireless-enabled peripheral device configured to be coupled to a personalized security device. The wireless-enabled peripheral device has a wireless communication interface. The system also includes a mobile device configured to establish a wireless connection with the wireless-enabled peripheral device via the wireless communication interface. Upon establishment of the wireless connection, the mobile device is further configured to control establishment of at least one contemporaneous connection of the wireless-enabled peripheral device to one or more other devices attempting to access the personalized security device.01-30-2014
20140040396AUTOMATED SELECTION AND INCLUSION OF A MESSAGE SIGNATURE - A system and method for the creation and automated selection and inclusion an automated signature text with an electronic message, wherein the automated selection of the automated signature text is dependent on attributes of the message, the designated recipients, or attributes of the designated recipients as compared to the sender's attributes, such as the encoding type and/or transport method selected for the electronic message or the location of the recipient without the need for multiple user profiles or manual editing by the sender. At least one of a plurality of automated signature texts is associated with at least one encoding type of a plurality of encoding types, at least one message transport type, or with at least one predetermined recipient attribute or the outcome of a comparison of the recipient attribute with the sender's attributes. The appropriate automated signature text is inserted prior to encoding of the message for transport.02-06-2014
20140059342System and Method of Accessing Keys for Secure Messaging - Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associated with the recipient. The received data is used to perform a validity check related to sending a secure message to the recipient. The validity check may uncover an issue that exists with sending a secure message to the recipient. A reason is determined for the validity check issue and is provided to the mobile device's user.02-27-2014
20140114858METHOD AND APPARATUS FOR CONTACTLESS PAYMENT AUTHENTICATION - The present disclosure relates generally to the authentication of contactless payments attempted by a device having embedded contactless payment functionality. In particular, the disclosure is directed to systems and methods that utilize authentication schemes that already exist on a device in which the contactless payment functionality is embedded. One example of such authentication schemes is the use of password protection to lock or unlock the device in which the contactless payment functionality is embedded. Using the password protection functionality may provide varying levels of authentication protection based on the desires of the user. A number of exemplary uses of such a method and apparatus are disclosed herein.04-24-2014
20140115665MESSAGE-HANDLING SERVER AND METHOD FOR HANDLING SECURE MESSAGE ATTACHMENTS FOR A MOBILE DEVICE - A secure message that includes an attachment is received at a server. The secure message may have a secure layer that indicates that the secure message is at least digitally signed. The secure message may be provided without the attachment to the mobile device over a wireless network. A request may be received from the mobile device to access the attachment. The request may include an attachment identifier (ID) that identifies the attachment in accordance with a message-attachment indexing system. In response to the request to access the attachment, the server may perform an index lookup to find the attachment based upon the attachment ID, may look through the secure layer of the secure message in order to locate the attachment within the secure message, and may render at least an initial portion of the attachment by the server in a format for viewing by the mobile device.04-24-2014
20140123012VIDEO-ANNOTATION ENTRY AND DISPLAY APPARATUS - An apparatus (such as but not limited to a portable electronics device) having a display, a user input interface, a wireless communications interface, and a control circuit operably coupled to the foregoing. The control circuit is configured to provide information on the display regarding a video being presently rendered on the apparatus and/or on another physically and logically discrete apparatus (such as but not limited to a broadcast television receiver or standalone computer). So configured a user can both watch the video while also reviewing the information on their portable electronic device. The information can comprise video-annotation information entered by the user and/or as provided by one or more user contacts.05-01-2014
20140134982SPEED DIAL PHONE ENTRY PAD - A method and electronic device for presenting a speed-dial contact on a display of the electronic device by rendering a photo associated with the contact on a keypad to enable speed-dial selection of the contact.05-15-2014
20140154975Verifying a Wireless Device - In some aspects of what is described here, a first wireless device detects proximity of a second wireless device (e.g., by a Near Field Communication (NFC) interface or another type of interface). Based on detecting proximity of the second wireless device, the first wireless device generates a recommendation request from information received from the second wireless device. The first wireless device sends the recommendation request to a trusted authority and receives a response. The response includes the trusted authority's recommendation whether to trust the second wireless device. The first wireless device can determine whether to trust the second wireless device based on the recommendation.06-05-2014
20140173704SYSTEM, DEVICE, AND METHOD FOR AUTHENTICATION OF A USER ACCESSING AN ON-LINE RESOURCE - A system, device and method for authenticating a user. The system, device and method may employ a computing device for providing credentials required for access to an on-line resource available over a network. The computing device may connect to the on-line resource to register a user. The computing device may receive from the on-line resource at least one request for a credential to identify the user. In response to the request, the computing device may generate a random credential, store the random credential in association with an on-line resource identifier and the request in a data store accessible to the computing device and, submit the random credential to the on-line resource to register the user.06-19-2014
20140215205System and Method for Exchanging Cryptographic Capabilities - In some data communication configurations, data received from a sender may need to be viewed or otherwise processed by more than one entity with a corresponding client. For example, a message sent to a corporate email address may be viewed by either or both a mobile device and a desktop device. For the sender to utilize the strongest algorithm or protocol used by the recipient, it would therefore need to know which algorithms or protocols are supported by both the mobile and desktop mail clients. A system and method are provided to enable the mobile device to know about the capabilities of related mail clients associated with the communication address (e.g. email address) and vice versa such that the intersection of the capabilities (i.e. the strongest algorithm or protocol supported by all parties involved) can be chosen and the messages or data cryptographically processed accordingly.07-31-2014
20140215550SYSTEM AND METHOD OF ENHANCING SECURITY OF A WIRELESS DEVICE THROUGH USAGE PATTERN DETECTION - A method of identifying a user of a device having a security policy and including a touch sensitive input device. The method includes receiving data corresponding to use of the touch sensitive input device by the user and determining from the received data at least one feature. Based on the at least one feature and a signature associated with an identifiable user, the method determines a likelihood that the user is the identifiable user and modifies, based on the likelihood, the security policy on the device.07-31-2014
20140237246Generating a Symmetric Key to Secure a Communication Link - A symmetric key to be used to secure a communication link between a first device and a second device is generated as follows: a first symmetric key is generated; a second symmetric key is generated; packets communicated between the first device and the second device over communication link are hashed to create a hash result; the first symmetric key, the second symmetric key and the hash result are hashed to generate a third symmetric key to be used to secure the communication link.08-21-2014
20140258722Forwarding E-Mail From A Wireless Device - A system and method of sending an e-mail message associated with a wireless device is provided. A request to forward or reply to an original e-mail message is sent from the wireless device to a server. The request contains one or more recipients and includes a message identifier of an original e-mail message. A portion indicator is provided for retrieving portions of the original e-mail message identified by the message identifier. An e-mail message is sent to the one or more recipients comprising any added user text and the one or more retrieved portions of the original e-mail message such that text of the original message that the user may not be aware is not forwarded to new recipients.09-11-2014
20140293781SYSTEM AND METHOD FOR SELECTING A MESSAGE TRANSPORT FOR A MULTI-MODE COMMUNICATION DEVICE - The present disclosure relates to a system and method for selecting a network for use by a communication device to process a data transmission. The method comprises: determining whether an amount of data sent by the communication device over a first network in communication with the communication device has reached a data limit; and if the amount of data has reached the data limit, selecting a second network for use by the communication device.10-02-2014
20140337636SIMPLIFIED MULTI-FACTOR AUTHENTICATION - A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element.11-13-2014
20140337941METHODS AND DEVICES FOR PROVIDING WARNINGS ASSOCIATED WITH CREDENTIALS TO BE STORED IN A CREDENTIAL STORE - Methods and devices for providing a warning associated with credentials to be stored in a credential store on a computing device are disclosed herein. In one broad aspect, the method comprises receiving a request to store, in the credential store, at least one credential for a specified service, determining whether a secure connection between the computing device and the specified service is available, associating the specified service with a level of security based on at least one of an availability of the secure connection or one or more properties of the secure connection, and providing a warning in response to determining that at least one credential stored in the credential store corresponds to the at least one credential for the specified service and is for a service that is associated with a level of security different from the level of security with which the specified service is associated.11-13-2014
20140359750Associating Distinct Security Modes with Distinct Wireless Authenticators - In some aspects, a first device detects information encoded in a wireless authenticator device based on a wireless interaction between the first device and the wireless authenticator device. The first device detects the information while securing resources on the first device according to a first security mode. Based on the detected information, the first device selects a second security mode associated with the wireless authenticator device. The first device then applies the selected second security mode. The selected second security mode is one of multiple distinct security modes. Each of the multiple distinct security modes is associated with a respective one of multiple wireless authenticator devices and defines accessibility attributes of the resources on the first device.12-04-2014
20140372298COMMUNICATION SYSTEM WITH DIGITAL WALLET HAVING BLANK USER CARD AND RELATED METHODS - A mobile wireless communications device may communicate with a terminal including a first NFC device, the terminal being capable of receiving data from a provisioning server. The mobile wireless communications device may include a housing, a wireless transceiver carried by the housing, a second NFC device carried by the housing, a memory carried by the housing, a display carried by the housing, and a processor carried by the housing and coupled to the wireless transceiver, the second NFC device, the memory, and the display. The processor may be configured to implement a digital wallet including user cards, receive from the terminal, via the second NEC device, a blank user card including user data fields, and fill the user data fields of the blank user card to define a completed user card and send the completed user card to the provisioning server.12-18-2014
20140372299MOBILE WIRELESS COMMUNICATIONS DEVICE HAVING DIGITAL WALLET WITH MULTI-MODE USER CARD AND RELATED METHODS - A mobile wireless communications device may include a housing, a wireless transceiver carried by the housing, a memory carried by the housing, a display carried by the housing, and a processor carried by the housing. The processor may be configured to implement a digital wallet including a multi-mode user card having first and second user interface modes, and selectively change the multi-mode user card from the first user interface mode to the second user interface mode based upon a current location, a current time, or a determined event. The second user interface mode may include one or more of a mapping interface mode, a survey interface mode, or a purchase interface mode.12-18-2014
20150015788METHODS AND DEVICES FOR PROVIDING COMPANION SERVICES TO VIDEO - Methods and devices for providing companion services to video are described. In one example embodiment, the method includes: identifying text contained within a video; determining, by performing pattern matching, if the identified text in the video contains actionable text; and if the identified text in the video contains actionable text, providing access to one or more features based on the actionable text.01-15-2015
20150019857METHOD AND SYSTEM FOR CONTROLLING SYSTEM SETTINGS OF A COMPUTING DEVICE - Methods and devices for controlling system settings of a computing device are described herein. One example embodiment comprises: determining configuration data associated with a software application, wherein the configuration data identifies one or more new system settings to be temporarily enforced on the computing device during an execution of the software application, and wherein the configuration data is digitally signed; and in response to an initiation of the execution of the software application, reconfiguring system settings on the computing device; wherein the reconfiguring comprises verifying at least one digital signature associated with the digitally signed configuration data; wherein if the at least one digital signature associated with the digitally signed configuration data successfully verifies, then the reconfiguring further comprises temporarily enforcing new system settings for the duration of the execution of the software application.01-15-2015
20150019863METHOD OF HANDLING A CERTIFICATION REQUEST - In a certification request, a user device includes an object identifier. When a certification authority generates an identity certificate responsive to receiving the certification request, the certification authority includes the object identifier, thereby allowing improved management of the identity certificate at the user device and elsewhere.01-15-2015
20150033329PASSWORD ENTRY USING 3D IMAGE WITH SPATIAL ALIGNMENT - A method of controlling access to an electronic device is disclosed. The method comprises: generating a modified first image from a first image, wherein the first image and the modified first image include a first image reference point; generating a modified second image from a second image, wherein the second image and the modified second image include a second image reference point; displaying a three dimensional representation of the modified first image overlaid by the modified second image; authenticating access to the electronic device in response to substantial alignment of the first image reference point in the modified first image with the second image reference point in the modified second image.01-29-2015

Patent applications by Neil Patrick Adams, Waterloo CA

Website © 2015 Advameg, Inc.