Patent application number | Description | Published |
20090221267 | NOTIFICATION OF ACCESS CONTROL REQUEST AND EXPLANATION INDICATIVE OF THE ACCESS CONTROL REQUEST ON A COMMUNICATION DEVICE - A communication device includes a display screen upon which information is displayed. A microprocessor configured to execute at least one notification program is provided that displays a notification descriptive of an access control request on the display screen. The at least one notification program is programmed to receive data indicative of an access control request and to receive data descriptive of the access control request. Additionally, the at least one notification program is further programmed to display a notification indicative of the access control request and comprising an explanation of the access control request based on the received descriptive data. | 09-03-2009 |
20100328110 | METHOD OF GENERATING AND PROVIDING A PASSWORD TO A HANDHELD ELECTRONIC DEVICE - A method of providing a password to a handheld electronic device having a reduced keyboard and a non-predictive keystroke interpretation system, wherein the reduced keyboard is of a particular keyboard type and the non-predictive keystroke interpretation system is of a particular system type. The method includes receiving a first character string in an electronic device, such as, without limitation, a PC, that is separate from the handheld electronic device, generating one or more second character strings in the electronic device based on the particular keyboard type, the first character string, and, possibly, the particular system type, and transmitting the one or more second character strings from the electronic device to the handheld electronic device as the password. | 12-30-2010 |
20110214184 | System and method for controlling applications to mitigate the effects of malicious software - Methods and systems for mitigating the effects of a malicious software application are disclosed. A dedicated module on the computing device receives from a malicious software detector a message indicating whether the application is malicious or has a malicious component. The dedicated module obtains a set of permissions to be granted to the application, and instructs software on the computing device that controls the permissions of the application to grant the set of permissions. | 09-01-2011 |
20110271273 | METHOD AND DEVICE FOR APPLICATION INSTALLATION TO MULTIPLE MEMORY COMPONENTS - A method and device for installing an application to a device are provided. The method includes: receiving, at the device, application files associated with the application, the application files including computer readable instruction files and resource files; installing, by an installation manager, the computer readable instruction files to a first memory component associated with the device; and storing the resource files on a second memory component associated with the device. | 11-03-2011 |
20120075175 | METHOD AND DEVICE FOR PROVIDING SYSTEM STATUS INFORMATION - The present disclosure provides a method and device for providing system status information. The method comprises: receiving, from an input mechanism associated with a communication device, a request to share system status information; and in response to receiving the request to share the system status information: (i) obtaining system status information associated with the communication device; and (ii) automatically populating one or more portions of an electronic message based on the system status information. The system status information comprises processor usage information. | 03-29-2012 |
20130093596 | NOTIFICATION OF ACCESS CONTROL REQUEST AND EXPLANATION INDICATIVE OF THE ACCESS CONTROL REQUEST ON A COMMUNICATION DEVICE - A communication device includes a display screen upon which information is displayed. A microprocessor configured to execute at least one notification program is provided that displays a notification descriptive of an access control request on the display screen. The at least one notification program is programmed to receive data indicative of an access control request and to receive data descriptive of the access control request. Additionally, the at least one notification program is further programmed to display a notification indicative of the access control request and comprising an explanation of the access control request based on the received descriptive data. | 04-18-2013 |
20130114808 | SYSTEM AND METHOD FOR PROVIDING AN INDICATION OF RANDOMNESS QUALITY OF RANDOM NUMBER DATA GENERATED BY A RANDOM DATA SERVICE - A system and method for providing an indication of randomness quality of random number data generated by a random data service. The random data service may provide random number data to one or more applications adapted to generate key pairs used in code signing applications, for example. In one aspect, the method comprises the steps of: retrieving random number data from the random data service; applying one or more randomness tests to the retrieved random number data to compute at least one indicator of the randomness quality of the random number data; associating the at least one indicator with at least one state represented by a color; and displaying the color associated with the at least one indicator to a user. The color may be displayed in a traffic light icon, for example. | 05-09-2013 |
20130145480 | E-MAIL WITH SECURE MESSAGE PARTS - A method for preventing a recipient of an electronically transmitted message from taking at least one action in relation to the message is disclosed. The message has at least two parts with one of the parts having a higher level of security than the other part. The method includes the step of extracting information from the message. The information indicates that the higher level security part is not permitted to have the action taken on it while the other part is so permitted. The method also includes the step of preventing the higher level security part from having the action taken on it in reaction to said recipient making an offending request. | 06-06-2013 |
20130167194 | SYSTEM AND METHOD FOR DETERMINING A SECURITY ENCODING TO BE APPLIED TO OUTGOING MESSAGES - A device comprising a processor is disclosed herein. In one broad aspect, the processor is configured to: determine whether a general message encoding configuration setting at the device is set to a first setting indicating that when a security encoding is to be applied to a message, the security encoding is to be established by a policy engine, wherein the established security encoding cannot be overridden by a security encoding selection algorithm at the device; and if the general message encoding configuration setting is set to the first setting, transmit the message to at least one message recipient via the policy engine such that the policy engine applies the security encoding to the message prior to the policy engine transmitting the message. | 06-27-2013 |
20130185553 | SYSTEM AND METHOD FOR ADMINISTERING DIGITAL CERTIFICATE CHECKING - Systems and methods for handling electronic messages. An electronic message that is associated with a digital certificate is to be processed. A decision whether to check the validity of the digital certificate is based upon digital certificate checking criterion. An IT administrator may provide to one or more devices configuration data that establishes the digital certificate checking criterion. | 07-18-2013 |
20130227360 | Method and Apparatus for Providing Intelligent Error Messaging - A method and apparatus for providing intelligent error messaging is disclosed wherein a user of a mobile communications device is provided with descriptive error messaging information to assist the user in overcoming errors associated with the processing of electronic messages and data. | 08-29-2013 |
20130232334 | SYSTEM AND METHOD FOR OBTAINING CERTIFICATE STATUS OF SUBKEYS - Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is acquired from the key server. If one or more subkeys or signatures of the subkeys are different in the acquired key, then the key is replaced. | 09-05-2013 |
20130247143 | SYSTEM AND METHOD FOR CONFIGURING DEVICES FOR SECURE OPERATIONS - Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices. Security mode configuration data is used in establishing a security-related mode of operation for the computing devices. | 09-19-2013 |
20130254437 | System and Method for Handling Peripheral Connections to Mobile Devices - Systems and methods for establishing a data connection between a mobile device and a peripheral. The mobile device is configured to determine whether to handle user approval of the data connection between the mobile device and the peripheral. Through the mobile device, an input mechanism is provided for the user to provide input. The input is used in determining whether to approve the data connection between the mobile device and the peripheral. | 09-26-2013 |
20130318344 | SYSTEM AND METHOD FOR PROCESSING ENCODED MESSAGES FOR EXCHANGE WITH A MOBILE DATA COMMUNICATION DEVICE - A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device, the message is processed so as to modify the message with respect to one or more encryption and/or authentication aspects. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a host system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the host system to one or more receivers. | 11-28-2013 |
20140075191 | SYSTEM AND METHOD FOR TRANSMITTING AND UTILIZING ATTACHMENTS - A method of handling cryptographic information in a communication comprising body elements and attachment elements to a mobile device includes the steps of determining if the communication includes an attachment element comprising cryptographic information and converting the attachment element into a body element upon determining that the communication includes an attachment element comprising cryptographic information. | 03-13-2014 |
20140087694 | SYSTEM AND METHOD OF CONNECTION CONTROL FOR WIRELESS MOBILE COMMUNICATION DEVICES - Systems and methods of connection control for wireless mobile communication devices enabled for communication via a plurality of communication connections are provided. Connection control information associates software applications with communication connections. When a connection request specifying a requested connection is received from a software application, it is determined whether the requested connection is permitted by the connection control information. Where the requested connection is permitted by the connection control information, the requested connection is opened. If the requested connection is a first connection opened by the software application, then the software application is associated with the requested connection in the connection control information. | 03-27-2014 |
20140359274 | SYSTEM AND METHOD FOR EXCHANGING ENCRYPTION KEYS BETWEEN A MOBILE DEVICE AND A PERIPHERAL DEVICE - Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In some embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security. | 12-04-2014 |
20140373155 | SYSTEM AND METHOD FOR CONTROLLING APPLICATIONS TO MITIGATE THE EFFECTS OF MALICIOUS SOFTWARE - Methods and systems for mitigating the effects of a malicious software application are disclosed. A dedicated module on the computing device receives from a malicious software detector a message indicating whether the application is malicious or has a malicious component. The dedicated module obtains a set of permissions to be granted to the application, and instructs software on the computing device that controls the permissions of the application to grant the set of permissions. | 12-18-2014 |
20140380045 | SYSTEM AND METHOD FOR WIPING AND DISABLING A REMOVED DEVICE - A system and method implemented at a server system, for securely wiping a remote mobile device after the device registration has been removed from the server system. Prior to removal of the device registration from the server system, a “pre-packaged” command is created and stored at the server system. In the event that it is determined, after removal of the registration, that the device should be wiped or disabled, means are provided for an administrator to issue the previously stored command to the target mobile device. | 12-25-2014 |