Patent application number | Description | Published |
20110113062 | SYSTEM AND METHOD FOR SEARCHING DISPARATE DATASTORES VIA A REMOTE DEVICE - A system and method are provided for searching the contents of a network system connected to data storage devices from a remote terminal over a wired or wireless link. This system formulates search requests, and dispatches the requests, A variety of search engines and services are invoked to find the requested contents. A summary is formed in a format brief enough for transmission over a wireless link. The search summary information is indexed the remote terminal to subsequently request all or part of a document referenced in the search summary, allows formation of requests of all or part of a referenced document in its original form or in a form transcoded appropriately for transmission over a wireless link and presented on the remote terminal. | 05-12-2011 |
20120210415 | METHOD, APPARATUS AND SYSTEM FOR PROVISIONING A PUSH NOTIFICATION SESSION - A system and method for provisioning a push notification session via a communications network between an application on a client terminal and a server corresponding to the application. In one aspect, a push provisioning entity transmits a message to the client terminal, whereby to configure the client terminal into a state in which it is able to request a push notification session with the server. An application on the client terminal can then request establishment of a push notification session by transmitting a push notification session request message to the push provisioning entity. The push provisioning entity generates a token for use in validating the push notification session, associates the generated token with the application and transmits the token to the application, which uses it to establish the push notification session. | 08-16-2012 |
20120284786 | SYSTEM AND METHOD FOR PROVIDING ACCESS CREDENTIALS - Embodiments of the invention are concerned with providing access credentials associated with a user of a service to a server hosting the service, e.g. enabling single sign on by the user to a number of servers. | 11-08-2012 |
20130104118 | APPLICATION INSTALLATION SYSTEM - A method, system and computer program product for controlling the installation of applications on a user terminal is disclosed. In one aspect, a catalogue server identifies a first and a second installation control setting corresponding to a first and a second application on the basis of user identification data from a data store comprising entries for a plurality of applications and their corresponding installation control settings. Subsequently, the catalogue server determines installation control data for at least one of the first and second application on the basis of the first and the second installation control setting. The determined installation control data is transmitted to the user terminal for controlling installation of at least one of the first and the second application | 04-25-2013 |
20130227279 | METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM - Data is stored on a computing device in an encrypted form using a control application. A data access application requests access to the data. It is determined whether the data access application has available a shared encryption key that is available to the control application. If a shared encryption key is available, the shared encryption key is used to encrypt a request for access to the data. If a shared encryption key is not available, a shared encryption key is negotiated with the control application, and the negotiated shared encryption key is used to encrypt the request for access to the data. The control application receives the encrypted request, decrypts the encrypted request using the shared encryption key, and makes the data stored on the computing device in encrypted form available to the data access application in response to the decrypted request. | 08-29-2013 |
20130227280 | METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM - A data access application key is generated. The data access application key is for use by a data access application to enable decryption of data that is stored in encrypted form on a computing device using the data access application key. The data access application key is generated using an identifier of the data access application and an application key that is specific to at least one of the computing device and/or a user of the computing device. | 08-29-2013 |
20130227287 | METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM - Data is stored on a computing device in encrypted form in respective digital containers. At least one data access application is stored on the computing device. A control application of the computing device connects to a remote control center. A command from the remote control center is received at the connected control application. The command contains an action to be taken in respect of at least one of the at least one data access application and the containers stored on the computing device. The command is passed from the connected control application to the data access application or container, and the data access application or container carries out the command. | 08-29-2013 |
20130238763 | METHOD, APPARATUS AND SYSTEM FOR PROVISIONING A PUSH NOTIFICATION SESSION - A system and method for provisioning a push notification session via a communications network between an application on a client terminal and a server corresponding to the application. In one aspect, a push provisioning entity transmits a message to the client terminal, whereby to configure the client terminal into a state in which it is able to request a push notification session with the server. An application on the client terminal can then request establishment of a push notification session by transmitting a push notification session request message to the push provisioning entity. The push provisioning entity generates a token for use in validating the push notification session, associates the generated token with the application and transmits the token to the application, which uses it to establish the push notification session. | 09-12-2013 |
20140208088 | METHODS FOR REMOTE CONFIGURATION OF SOFTWARE APPLICATIONS - Methods for remotely configuring application software on a user device are described. The application software defines at least one operating parameter having a set of pre-defined values which change the way the application interacts with the operating system. The operating parameter can be configured remotely and pushed to the user device where it is enforced by the application. Methods for providing information of the operating parameter to a remote device and for updating the configuration of an application are also described. | 07-24-2014 |