Patent application number | Description | Published |
20090210506 | COMPRESSIBLE DISPLAY OF E-MAIL MESSAGE STRING TO FACILITATE READABILITY - A displayed string of emails is effectively compressed for improved readability by deleting some or all headers and/or by skipping the cursor from one message body to another in response to “hot” key actuation (s) by a user. | 08-20-2009 |
20090240888 | SYSTEM AND METHOD FOR OBSCURING HAND-HELD DEVICE DATA TRAFFIC INFORMATION - Increasing security for a hand-held data processing device with communication functionality where such a device includes an access-ordered memory cache relating to communications carried out by the device. The hand-held data processing device has a locked state that is entered by the device receiving or initiating a trigger. On occurrence of the trigger to enter the locked state the memory cache is reordered so as to disrupt the access-ordering of the cache to obscure device traffic information and thus increase the security of the device in the locked state. | 09-24-2009 |
20090240943 | CHALLENGE RESPONSE-BASED DEVICE AUTHENTICATION SYSTEM AND METHOD - A challenge response scheme authenticates a requesting device by an authenticating device. The authenticating device generates and issues a challenge to the requesting device. The requesting device combines the challenge with a hash of a password provided by a user, and the combination is further hashed in order to generate a requesting encryption key used to encrypt the user supplied password. The encrypted user supplied password is sent to the authenticating device as a response to the issued challenge. The authenticating device generates an authenticating encryption key by generating the hash of a combination of the challenge and a stored hash of an authenticating device password. The authenticating encryption key is used to decrypt the response in order to retrieve the user-supplied password. If the user-supplied password hash matches the stored authenticating device password hash, the requesting device is authenticated and the authenticating device is in possession of the password. | 09-24-2009 |
20100031371 | System and Method for Handling Peripheral Connections to Mobile Devices - Systems and methods for establishing a data connection between a mobile device and a peripheral. The mobile device is configured to determine whether to handle user approval of the data connection between the mobile device and the peripheral. Through the mobile device, an input mechanism is provided for the user to provide input. The input is used in determining whether to approve the data connection between the mobile device and the peripheral. | 02-04-2010 |
20100049979 | SYSTEM AND METHOD FOR SENDING ENCRYPTED MESSAGES TO A DISTRIBUTION LIST - A system and method for sending encrypted messages to a distribution list that facilitates the sending of such messages only to individuals or other entities associated with the distribution list that will be able to read the message. In one embodiment, the method comprises the steps of: identifying a distribution list address in a message; determining one or more member addresses associated with the distribution list address; for each member address, determining if a public key for a member identified by the respective member address is available on the computing device; encrypting the message to each member identified by the one or more member addresses for which a public key for the respective member is available on the computing device; sending the encrypted message to the distribution list address if each of the one or more member addresses associated with the distribution list identifies a member for which a public key is available on the computing device; and sending the message to each of the one or more member addresses that identifies a member for which a public key is available on the computing device otherwise. | 02-25-2010 |
20100082976 | SYSTEM AND METHOD FOR RETRIEVING RELATED CERTIFICATES - A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, a certificate synchronization application is programmed to perform certificate searches by querying one or more certificate servers for all certificate authority (CA) certificates and cross-certificates on the certificate servers. In another embodiment, all certificates related to an identified certificate are retrieved from the certificate servers automatically by the certificate synchronization application, where the related certificates comprise at least one of one or more CA certificates and one or more cross-certificates. Embodiments of the invention facilitate at least partial automation of the downloading and establishment of certificate chains, thereby minimizing the need for users to manually search for individual certificates. | 04-01-2010 |
20100100932 | SYSTEM AND METHOD FOR DETERMINING A SECURITY ENCODING TO BE APPLIED TO OUTGOING MESSAGES - A system and method for determining a security encoding to be applied to a message being sent by a user of a computing device, such as a mobile device, for example. In one broad aspect, the method comprises determining, at the computing device, whether a general message encoding configuration setting thereon indicates that the security encoding to be applied to the message is to be established by a policy engine; if the general message encoding configuration setting on the computing device indicates that the security encoding to be applied to the message is to be established by the policy engine, determining the security encoding to be applied to the message by querying the policy engine for the security encoding to be applied to the message; applying the determined security encoding to the message; and transmitting the message to which the security encoding has been applied to the at least one recipient. In one embodiment, the policy engine is a PGP Universal Server. | 04-22-2010 |
20100121931 | METHOD AND APPARATUS FOR PROCESSING DIGITALLY SIGNED MESSAGES TO DETERMINE ADDRESS MISMATCHES - A method and apparatus for processing digitally signed messages in which address mismatch errors are detected. In at least one aspect, the number of address mismatch errors reported to a user for a message may be minimized for messages that properly incorporate message portions signed by someone other than the sender of the message, as may be the case where the message contains a conversation thread for example, by performing at least one pre-determined action for digital signatures corresponding to signed data appearing after a message separator. The message separator may indicate that the message contains data from an older forwarded message or from an older message that has been replied to, for example. The at least one-predetermined action may comprise bypassing verification of address matches for those digital signatures, or verifying address matches for those digital signatures but suppressing user notification of any address mismatch errors, for example. | 05-13-2010 |
20100122089 | SYSTEM AND METHOD FOR COMPRESSING SECURE E-MAIL FOR EXCHANGE WITH A MOBILE DATA COMMUNICATION DEVICE - A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device: the message is processed so as to modify the message with respect to encryption and/or authentication aspect. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a remote system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the remote system to one or more receivers. | 05-13-2010 |
20100133338 | METHOD, SYSTEM AND MOBILE DEVICE EMPLOYING ENHANCED FINGERPRINT AUTHENTICATION - The described embodiments relate generally to methods and systems for fingerprint authentication for a computing device. In one embodiment, the method comprises: storing a default finger swipe scan direction; receiving a finger swipe scan; authenticating the received finger swipe scan; determining a received finger swipe scan direction; and configuring the default finger swipe scan direction. The computing device may comprise a mobile device. | 06-03-2010 |
20100197292 | DEVICE AND METHOD FOR GENERATING USER NOTIFICATIONS ASSOCIATED WITH TASKS THAT ARE PENDING COMPLETION - A device and method for generating user notifications associated with tasks that are pending completion on a mobile device. When additional input is required from a user of the mobile device to complete performance of a task and is not being received from the user within a predefined time period, at least one form of user notification is generated. The particular form or forms of user notification are defined by a user profile associated with the user. User notifications may comprise visual, audible, and/or vibratory alerts, and different forms of these user notifications may be generated in a sequence. The volume of audible alerts or the period between periodic user notifications may vary over time. | 08-05-2010 |
20100211795 | SYSTEM AND METHOD FOR VERIFYING DIGITAL SIGNATURES ON CERTIFICATES - A system and method for verifying a digital signature on a certificate, which may be used in the processing of encoded messages. In one embodiment, when a digital signature is successfully verified in a signature verification operation, the public key used to verify that digital signature is cached. When a subsequent attempt to verify the digital signature is made, the public key to be used to verify the digital signature is compared to the cached key. If the keys match, the digital signature can be successfully verified without requiring that a signature verification operation in which some data is decoded using the public key be performed. | 08-19-2010 |
20100222033 | COMMUNICATIONS SYSTEM PROVIDING MOBILE DEVICE NOTIFICATION BASED UPON PERSONAL INTEREST INFORMATION AND CALENDAR EVENTS - A communications system may include at least one mobile wireless communications device for storing personal interest information for respective contacts and for storing calendar event data. The system may further include a notification server communicating with the at least one mobile wireless communications device via a wireless communications network and configured to access the personal interest information and calendar event data from the at least one mobile wireless communications device, and send notifications to the at least one mobile wireless communications device based upon the personal interest information and the calendar event data. | 09-02-2010 |
20100223131 | COMMUNICATIONS SYSTEM PROVIDING MOBILE DEVICE NOTIFICATION BASED UPON CONTACT WEB PAGES AND RELATED METHODS - A communications system may include at least one mobile wireless communications device for storing an address of a contact Web page including personal interest information for a contact, and a notification server which communicates with the at least one mobile wireless communications device via a wireless communications network. The notification server may be configured to access the address from the at least one mobile wireless communications device, retrieve the personal interest information on the contact Web page based upon the address, and send notifications to the at least one mobile wireless communications device based upon the retrieved personal interest information. | 09-02-2010 |
20100223139 | COMMUNICATIONS SYSTEM PROVIDING PERSONALIZED MOBILE WIRELESS COMMUNICATIONS DEVICE NOTIFICATIONS AND RELATED METHODS - A communications system may include at least one mobile wireless communications device associated with a respective user, a network server within a protected computer network, and a notification server outside of the protected computer network for generating generic notifications. The network server may be for storing within the protected computer network personalizing information for the user of the at least one wireless communications device, receiving generic notifications from the notification server, and generating and sending to the at least one wireless communications device personalized notifications based upon the personalizing information and the generic notifications. | 09-02-2010 |
20100223140 | COMMUNICATIONS SYSTEM PROVIDING PERSONALIZED MOBILE WIRELESS COMMUNICATIONS DEVICE NOTIFICATIONS AND RELATED METHODS - A communications system may include at least one mobile wireless communications device associated with a respective user and storing personalizing information for the user, a network server within a protected computer network, and a notification server outside of the protected computer network configured to generate generic notifications. The network server may be configured to receive generic notifications from the notification server and sending the generic notifications to the at least one mobile wireless communications device. Moreover, the at least one mobile wireless communications device may be configured to receive the generic notifications from the network server and generate personalized notifications based upon the personalizing information and the received generic notifications. | 09-02-2010 |
20100223475 | LOW-LEVEL CODE SIGNING MECHANISM - Before an application is allowed to execute a secure function, code signing keys associated with the application are analyzed for correspondence with the class that contains the secure function as well as correspondence with the secure function. Optionally, code signing keys associated with the application are analyzed for correspondence with the input parameters to the function. | 09-02-2010 |
20100275133 | COMPRESSIBLE DISPLAY OF E-MAIL MESSAGE STRING TO FACILITTE READABILITY - A displayed string of emails is effectively compressed for improved readability by deleting some or all headers and/or by skipping the cursor from one message body to another in response to “hot” key actuation(s) by a user. | 10-28-2010 |
20110191845 | WIRELESS COMMUNICATION DEVICE WITH DURESS PASSWORD PROTECTION AND RELATED METHOD - A wireless communication device (and its related method of operation) includes, if invoked, password protected access to data stored therewithin and/or to normal device operations and further includes duress password checking logic that automatically causes a duress message to be sent if a duress password has been entered. The duress message is preferably sent without maintaining any user accessible indication of such sending. It is also preferred that the password checking logic automatically cause an end-of-duress message to be sent if a normal password is entered after a duress password has been entered. A plurality of different duress passwords may be entered into a duress password portion of data memory in the device. | 08-04-2011 |
20110271322 | System and Method for Configuring Devices for Secure Operations - Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices. Security mode configuration data is used in establishing a security-related mode of operation for the computing devices. | 11-03-2011 |
20110294471 | DEVICE AND METHOD FOR GENERATING USER NOTIFICATIONS ASSOCIATED WITH TASKS THAT ARE PENDING COMPLETION - A device and method for generating user notifications associated with tasks that are pending completion on a mobile device. When additional input is required from a user of the mobile device to complete performance of a task and is not being received from the user within a predefined time period, at least one form of user notification is generated. The particular form or forms of user notification are defined by a user profile associated with the user. User notifications may comprise visual, audible, and/or vibratory alerts, and different forms of these user notifications may be generated in a sequence. The volume of audible alerts or the period between periodic user notifications may vary over time. | 12-01-2011 |
20120172019 | COMMUNICATIONS SYSTEM PROVIDING MOBILE DEVICE NOTIFICATION BASED UPON PERSONAL INTEREST INFORMATION AND CALENDAR EVENTS - A communications system may include at least one mobile wireless communications device for storing personal interest information for respective contacts and for storing calendar event data. The system may further include a notification server communicating with the at least one mobile wireless communications device via a wireless communications network and configured to access the personal interest information and calendar event data from the at least one mobile wireless communications device, and send notifications to the at least one mobile wireless communications device based upon the personal interest information and the calendar event data. | 07-05-2012 |
20120331079 | COMPRESSIBLE DISPLAY OF E-MAIL MESSAGE STRING TO FACILITATE READABILITY - A displayed string of emails is effectively compressed for improved readability by deleting some or all headers and/or by skipping the cursor from one message body to another in response to hot key actuation(s) by a user. | 12-27-2012 |
20130014250 | WIRELESS COMMUNICATION DEVICE WITH PASSWORD PROTECTION AND RELATED METHOD - A wireless communication device (and its related method of operation) includes, if invoked, password protected access to data stored therewithin and/or to normal device operations and further includes duress password checking logic that automatically causes a duress message to be sent if a duress password has been entered. The duress message is preferably sent without maintaining any user accessible indication of such sending. It is also preferred that the password checking logic automatically cause an end-of-duress message to be sent if a normal password is entered after a duress password has been entered. A plurality of different duress passwords may be entered into a duress password portion of data memory in the device. | 01-10-2013 |
20140223186 | SYSTEM AND METHOD FOR VERIFYING DIGITAL SIGNAUTES ON CERTIFICATES - A system and method for verifying a digital signature on a certificate, which may be used in the processing of encoded messages. In one embodiment, when a digital signature is successfully verified in a signature verification operation, the public key used to verify that digital signature is cached. When a subsequent attempt to verify the digital signature is made, the public key to be used to verify the digital signature is compared to the cached key. If the keys match, the digital signature can be successfully verified without requiring that a signature verification operation in which some data is decoded using the public key be performed. | 08-07-2014 |