Patent application number | Description | Published |
20100100731 | PUSHING CERTIFICATE CHAINS TO REMOTE DEVICES - Rather than managing a certificate chain related to a newly issued identity certificate at a terminal to which a wireless device occasionally connects, a certificate server can act to determine the identity certificates in a certificate chain related to the newly issued identity certificate. The certificate server can also act to obtain the identity certificates and transmit the identity certificates towards the device that requested the newly issued identity certificate. A mail server may receive the newly issued identity certificate and the identity certificates in the certificate chain and manage the timing of the transmittal of the identity certificates. By transmitting the identity certificates in the certificate chain before transmitting the newly issued identity certificate, the mail server allows the user device to verify the authenticity of the newly issued identity certificate. | 04-22-2010 |
20100241851 | SYSTEM AND METHOD FOR VALIDATING CERTIFICATE ISSUANCE NOTIFICATION MESSAGES - To validate a received certificate issuance notification message, a device may verify that the certificate issuance notification message conforms to expected norms or authenticate a signature associate with the certificate issuance notification message. Upon validating, the device may then transmit a uniform resource locator, extracted from the certificate issuance notification message, to a network entity configured for processing certificate issuance. | 09-23-2010 |
20100310073 | SYSTEM AND METHOD OF CROSS-COMPONENT MESSAGE PROCESSING - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. | 12-09-2010 |
20110179465 | APPARATUS, AND AN ASSOCIATED METHOD, FOR FACILITATING SECURE OPERATIONS OF A WIRELESS DEVICE - An apparatus, and an associated method, facilitates security at a wireless device, such as a wireless device comprising a mobile computing platform. A security decision engine is provided that monitors for an event necessitating a security decision. When a security decision is required, request is made of a knowledge fetcher, provided by a trusted third-party, installed at the wireless device for the security decision. The knowledge fetcher obtains the security decision, such as by obtaining the security decision from a remote, trusted third-party server, and provides the security decision to the decision engine. Use is made of the security decision pursuant to a setting for which the security decision is needed. | 07-21-2011 |
20110191429 | METHOD FOR ADVANCED EMAIL THREAD MANAGEMENT - A method and device for managing e-mails to prevent thread splitting, comprising receiving and displaying a first e-mail thread, generating a notification of receipt of any further e-mail thread prior to sending a response to the first e-mail thread, generating a first prompt for saving the response to the first e-mail thread as a draft and displaying the further e-mail thread; and generating a further prompt for pasting the draft response as a reply to the further e-mail thread instead of the first e-mail thread. | 08-04-2011 |
20110211690 | PROTOCOL FOR PROTECTING CONTENT PROTECTION DATA - Through the use of a one-time-use nonce, the transfer of cryptographic data over a potentially insecure link in a two-factor content protection system is avoided. The nonce may be stored encrypted with a public key from a smart card. A random key may be used to produce a storage key, which is used to encrypt a content protection key. The random key may be stored, encrypted with a key derived from the nonce. Instead of receiving a raw content protection key over the potentially insecure link, the raw nonce is received and, once used, replaced with a new nonce. | 09-01-2011 |
20120023174 | RECIPIENT CHANGE NOTIFICATION - An electronic communication device may, perhaps with the assistance of a mobile device server, determining that a new electronic message received by the device is part of a message thread that includes the new message and at least one prior electronic message previously received at the device. A comparison may be made of address information of the new message with address information of the at least one prior electronic message in the message thread to determine that there has been a change in addressed recipients between the new message and the at least one prior electronic message. The device may then notify a user of the device of the change. | 01-26-2012 |
20120042166 | METHOD AND DEVICE FOR AUTOMATICALLY DISTRIBUTING UPDATED KEY MATERIAL - A method for handling an encrypted message received on an electronic device that has not been encrypted using a current public key. The portable electronic device automatically generates a reply message to the sender in response to determining that the message has not been encrypted with the current public key. The reply message may contain the current public key of the recipient device, and may request the sender to resend the message encrypted with the current public key. | 02-16-2012 |
20120047212 | System and method for obtaining a portion of an archived email message - A first email message associated with a mobile communication device of a user is conveyed to a destination. The first email message comprises a forwarded portion of a second email message that has been previously archived by an email server associated with the user. The step of conveying comprises the step of obtaining the forwarded portion of the second email message without intervention of the user. | 02-23-2012 |
20120089847 | METHOD OF OBTAINING AUTHORIZATION FOR ACCESSING A SERVICE - Methods and devices for obtaining authorization for a requestor to access a service are provided. In accordance with one embodiment, there is provided a method comprising receiving a requestor request for access to a service; sending an authorization request to one or more mobile devices associated with one or more authorizers on a first approval list; receiving an authorization response from the one or more mobile devices associated with the one or more authorizers on the first approval list; determining whether a predetermined level of authorization is received; and when the predetermined level of authorization is received, authorizing access to the service. | 04-12-2012 |
20120110345 | METHOD AND SYSTEM FOR SECURING DATA OF A MOBILE COMMUNICATIONS DEVICE - A method and system for securing data of a mobile communications device. The method includes: determining that first application data is data associated with a first server; encrypting the first application data with an encryption key stored in the mobile communications device; storing the encrypted first application data on a memory; receiving a request to access the first application data from an application or a service implemented from the mobile communications device; determining that the application or service is authorized to access the first application data; and in response to said determining, decrypting the first application data with the encryption key. | 05-03-2012 |
20120110675 | RESTRICTIONS TO DATA TRANSMISSION - Data received at, or created on, a device may be tagged as corporate dependent upon a service over which the data is received or an application in which the data is created. When a user attempts to insert tagged data into a data item that is to be transmitted by the device, the insertion may be prevented. Similarly, the transmission of tagged data may be restricted to only occur on a secure service. | 05-03-2012 |
20120124640 | DATA SOURCE BASED APPLICATION SANDBOXING - A computing device and a method for a computing device to control access to data stored on a data store of the device. An access component of the device having control over access to the data. The access component being operative to receive a request for data from a requesting component, identify an assigned access domain of the requesting component and an assigned data domain of the requested data and determine whether the requesting component is authorized to access the data by comparing the assigned access domain and the data domain with permissions specified in a security policy. If the assigned access domain is authorized to access the data domain, the access component may provide access to the requested data. | 05-17-2012 |
20120131116 | CONTROLLING DATA TRANSFER ON MOBILE DEVICES - A communication system can provide one or more mechanisms for controlling data transfer on a mobile device. A technique based on such a mechanism includes receiving a request to transfer data to an application, accessing a first service identifier associated with the data, accessing a second service identifier associated with a service mode of the application, and determining whether to allow a transfer of the data to the application based on the first service identifier and the second service identifier. | 05-24-2012 |
20120159183 | METHOD AND APPARATUS FOR SECURING A COMPUTING DEVICE - A method and apparatus for securing a computing device are provided. A state of the computing device is determined, the state associated with a protection state. The computing device is automatically switching between a plurality of security levels at based on the state. | 06-21-2012 |
20120290835 | SYSTEM AND METHOD FOR VALIDATING CERTIFICATE ISSUANCE NOTIFICATION MESSAGES - To validate a received certificate issuance notification message, a device may verify that the certificate issuance notification message conforms to expected norms or authenticate a signature associate with the certificate issuance notification message. Upon validating, the device may then transmit a uniform resource locator, extracted from the certificate issuance notification message, to a network entity configured for processing certificate issuance. | 11-15-2012 |
20130031362 | METHOD OF HANDLING A CERTIFICATION REQUEST - In a certification request, a user device includes an object identifier. When a certification authority generates an identity certificate responsive to receiving the certification request, the certification authority includes the object identifier, thereby allowing improved management of the identity certificate at the user device and elsewhere. | 01-31-2013 |
20130055379 | SYSTEM, DEVICE AND METHOD FOR AUTHENTICATION - A computing device and computing device implemented method for setting a security level of the computing device. The method may comprise the computing device presenting a challenge to a user of the computing device. The challenge requiring the user to register a password with the computing device. The computing device may receive the password through a user input interface of the computing device in response to the challenge. The computing device may process the received password to calculate a password strength value and evaluate the password strength value to assign the security level. In an aspect, the security level may assign a higher security level when the password strength value is relatively high. In an aspect, the security level may allow for an expanded range of user selectable security options when the password strength value is relatively high. | 02-28-2013 |
20130073846 | PUSHING CERTIFICATE CHAINS TO REMOTE DEVICES - Rather than managing a certificate chain related to a newly issued identity certificate at a terminal to which a wireless device occasionally connects, a certificate server can act to determine the identity certificates in a certificate chain related to the newly issued identity certificate. The certificate server can also act to obtain the identity certificates and transmit the identity certificates towards the device that requested the newly issued identity certificate. A mail server may receive the newly issued identity certificate and the identity certificates in the certificate chain and manage the timing of the transmittal of the identity certificates. By transmitting the identity certificates in the certificate chain before transmitting the newly issued identity certificate, the mail server allows the user device to verify the authenticity of the newly issued identity certificate. | 03-21-2013 |
20130138951 | METHOD AND DEVICE FOR AUTOMATICALLY DISTRIBUTING UPDATED KEY MATERIAL - A method for handling an encrypted message received on an electronic device that has not been encrypted using a current public key. The portable electronic device automatically generates a reply message to the sender in response to determining that the message has not been encrypted with the current public key. The reply message may contain the current public key of the recipient device, and may request the sender to resend the message encrypted with the current public key. | 05-30-2013 |
20130311585 | RECIPIENT CHANGE NOTIFICATION - An electronic communication device may, perhaps with the assistance of a mobile device server, determining that a new electronic message received by the device is part of a message thread that includes the new message and at least one prior electronic message previously received at the device. A comparison may be made of address information of the new message with address information of the at least one prior electronic message in the message thread to determine that there has been a change in addressed recipients between the new message and the at least one prior electronic message. The device may then notify a user of the device of the change. | 11-21-2013 |
20150019863 | METHOD OF HANDLING A CERTIFICATION REQUEST - In a certification request, a user device includes an object identifier. When a certification authority generates an identity certificate responsive to receiving the certification request, the certification authority includes the object identifier, thereby allowing improved management of the identity certificate at the user device and elsewhere. | 01-15-2015 |