Patent application number | Description | Published |
20080279462 | SELECTIVE COMPRESSION OF SYNCHRONIZED CONTENT BASED ON A CALCULATED COMPRESSION RATIO - The present invention discloses a system and method for synchronizing data between a first data store and a second data store. The system can include a synchronization component, a compression pre-processor, and a compression/decompression component. The synchronization component can automatically synchronize content between the first data store and the second data store. The compression pre-processor can determine a compression ratio for digital content before the digital content is compressed. The compression/decompression component can selectively compress digital content based upon the compression ratio determined by the compression pre-processor. The selectively compressed digital content can he automatically conveyed between the first data store and the second data store during synchronization operations involving the synchronization component. The compression/decompression component can automatically decompress received content that has been compressed. This decompression can occur automatically before adding the digital content to a content receiving data store. | 11-13-2008 |
20090099936 | USING VISUAL IMAGES TRANSFERRED FROM WIRELESS COMPUTING DEVICE DISPLAY SCREENS - Within a wireless computing device, a method of conducting commerce can include receiving a user input in the wireless computing device specifying an account to which a proposed transaction is to be billed and identifying contact information for a billing entity according to the user specified account. The billing entity can manage the account. An authorization can be requested from the billing entity via a wireless communications link established using the contact information. The method also can include receiving the authorization from the billing entity via the wireless communications link, generating a visual image which identifies the billing entity and represents the authorization received from the billing entity, and presenting the visual image upon the display screen of the wireless computing device. Accordingly, a visual image reader can read the displayed visual image. | 04-16-2009 |
20100023533 | EMBEDDED CHANGE LOGGING FOR DATA SYNCHRONIZATION - Embodiments of the present invention provide for embedded change logging for data synchronization. In an embodiment of the invention, an embedded change logging data processing system can include a change embedded database (EDB) disposed in a pervasive device. The EDB can store entries for notified changes in data for multiple different end-user applications in the pervasive device. The system also can include a change log service (CLS) disposed in the pervasive device and coupled to the EDB. The CLS can include program code enabled to register with multiple different end-user applications in the pervasive device to receive notifications of changes, and to write entries to the EDB responsive to the notifications. Finally, the system can include a synchronization client disposed in the pervasive device separately from the CLS. The synchronization client can include program code enabled to directly access the EDB to perform data synchronization with a remote host. | 01-28-2010 |
20120143820 | EMBEDDED CHANGE LOGGING FOR DATA SYNCHRONIZATION - Embodiments of the present invention provide for embedded change logging for data synchronization. In an embodiment of the invention, an embedded change logging data processing system can include a change embedded database (EDB) disposed in a pervasive device. The EDB can store entries for notified changes in data for multiple different end-user applications in the pervasive device. The system also can include a change log service (CLS) disposed in the pervasive device and coupled to the EDB. The CLS can include program code enabled to register with multiple different end-user applications in the pervasive device to receive notifications of changes, and to write entries to the EDB responsive to the notifications. Finally, the system can include a synchronization client disposed in the pervasive device separately from the CLS. The synchronization client can include program code enabled to directly access the EDB to perform data synchronization with a remote host. | 06-07-2012 |
20130178190 | MOBILE DEVICE IDENTIFICATION FOR SECURE DEVICE ACCESS - An embodiment of the invention includes initially registering information with a data system, wherein the registered information pertains to a user of a mobile device and includes credential information, and further includes a message address associated with the user. An enrollment request, together with the specified credential information, is sent to a management server. Responsive thereto, the server sends a message of specified type to the message address associated with the user, wherein such message includes a pin code. The pin code is then sent from the device to the server, and responsive to receiving the pin code, the server is operated to deliver a security token, for use in authenticating the mobile device to selectively access the particular data processing system. | 07-11-2013 |
20130290257 | EMBEDDED CHANGE LOGGING FOR DATA SYNCHRONIZATION - Embodiments of the present invention provide for embedded change logging for data synchronization. In an embodiment of the invention, an embedded change logging data processing system can include a change embedded database (EDB) disposed in a pervasive device. The EDB can store entries for notified changes in data for multiple different end-user applications in the pervasive device. The system also can include a change log service (CLS) disposed in the pervasive device and coupled to the EDB. The CLS can include program code enabled to register with multiple different end-user applications in the pervasive device to receive notifications of changes, and to write entries to the EDB responsive to the notifications. Finally, the system can include a synchronization client disposed in the pervasive device separately from the CLS. The synchronization client can include program code enabled to directly access the EDB to perform data synchronization with a remote host. | 10-31-2013 |
20130310002 | Mobile Device Validation - The illustrative embodiments provide a method, apparatus, and computer program product for validating a mobile device. Voice data is received from the mobile device. The voice data comprises a recording of a pass phrase spoken by a user at the mobile device. A determination is made as to whether the mobile device is a valid mobile device using the voice data. An access code to the mobile device is sent in response to a determination that the mobile device is the valid mobile device. | 11-21-2013 |
20130324083 | Authentication Request Management - The different illustrative embodiments provide a method, computer program product, and apparatus for managing an authentication request. A determination is made whether additional authentication is to be performed responsive to receiving the authentication request to access an application from a mobile device. A phone number to call is sent to the mobile device responsive to a determination that the additional authentication is to be performed. A determination is made whether an incoming call to the phone number is from the mobile device and within a selected period of time. The authentication request to access the application from the mobile device is granted responsive to a determination that the incoming call to the phone number is from the mobile device and within the selected period of time. | 12-05-2013 |
20130324086 | Authentication Request Management - The different illustrative embodiments provide a method, computer program product, and apparatus for managing an authentication request. A determination is made whether additional authentication is to be performed responsive to receiving the authentication request to access an application from a mobile device. A phone number to call is sent to the mobile device responsive to a determination that the additional authentication is to be performed. A determination is made whether an incoming call to the phone number is from the mobile device and within a selected period of time. The authentication request to access the application from the mobile device is granted responsive to a determination that the incoming call to the phone number is from the mobile device and within the selected period of time. | 12-05-2013 |
20140033299 | Protecting data on a mobile device - A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a “data protection profile” for the device. This profile defines at least one security event (criteria or condition) associated with the device, and at least one protection action that should occur to protect data on the device upon the triggering of the event. Once defined in a profile, the application monitors for the occurrence of the security event. Upon the occurrence of the specified event, the protection action is enforced on the device to protect the data. | 01-30-2014 |
20140059671 | Device identification for externalizing password from device coupled with user control of external password service - Information and data stored by a mobile device is protected by comprising applying password-protection to the locally-stored information without persistently storing the corresponding password locally. Rather, the corresponding password is stored by a remote password server. In response to a trigger event on the mobile device, such as an unlocking action by the user, a request is sent by the mobile device to the password server to retrieve the corresponding server, and the corresponding password is returned to the mobile device. The mobile device can then use the password to access the protected information. If the user determines that the mobile device is lost, stolen, or out of the user's physical control, the user may access the password server and disable the sending of the password to the mobile device, thereby thwarting attempts to access the protected data on the mobile device. | 02-27-2014 |
20140130174 | Application and Data Removal System - A method, programmed medium and system are provided for a server-based security manager application to support a self-cleaning operation on a remote computerized device. When a computer device has been reported as being missing for example, the security manager server application will cause the device to take pro-determined actions such as un-installing predetermined applications contained on the device and removing all persisted data associated with such predetermined applications. | 05-08-2014 |