Patent application number | Description | Published |
20100328110 | METHOD OF GENERATING AND PROVIDING A PASSWORD TO A HANDHELD ELECTRONIC DEVICE - A method of providing a password to a handheld electronic device having a reduced keyboard and a non-predictive keystroke interpretation system, wherein the reduced keyboard is of a particular keyboard type and the non-predictive keystroke interpretation system is of a particular system type. The method includes receiving a first character string in an electronic device, such as, without limitation, a PC, that is separate from the handheld electronic device, generating one or more second character strings in the electronic device based on the particular keyboard type, the first character string, and, possibly, the particular system type, and transmitting the one or more second character strings from the electronic device to the handheld electronic device as the password. | 12-30-2010 |
20100328154 | CONTROLLING A GPS RECEIVER BY DETECTING MOTION BASED ON RADIOFREQUENCY SIGNAL TRACES - Operation of a GPS receiver on a wireless communications device is controlled by determining whether the device is stationary or in motion. Motion determination is accomplished by analyzing radiofrequency signal traces, e.g. GSM signal traces, received from one or more nearby base stations. A three-tiered analysis provides a progressively more accurate determination as to whether the device is moving or stationary while providing, in certain instances, a more rapid determination than prior-art techniques. When the device is determined to be stationary, the GPS receiver can be deactivated. When the device is determined to be moving, the GPS receiver can be reactivated. | 12-30-2010 |
20110210171 | METHODS AND DEVICES FOR TRANSMITTING AND RECEIVING DATA USED TO ACTIVATE A DEVICE TO OPERATE WITH A SERVER - Embodiments of the systems, devices, and methods described herein generally facilitate transmission and reception of activation data for use in activating a mobile device to operate with a server. In accordance with one example embodiment, an activation barcode is received from a server by reading an image comprising the activation barcode via a computing device, wherein the image is displayed on a display associated with the computing device, and wherein the activation barcode encodes activation data comprising an activation password. The activation barcode is decoded at the mobile device to obtain the activation password, and an authentication is performed using the activation password after a device activation request is transmitted to the server, wherein the mobile device is activated to operate with the server if the authentication is successful. | 09-01-2011 |
20110231216 | SYSTEM AND METHOD FOR CONTROLLING EVENT REMINDERS - A system and method are provided for obtaining data that could affect event details, such that this data can be used to generate alerts that are sent early enough to give the user time to reach the event, predict lateness, arrange replacements/delegates, reschedule, cancel meetings in advance, etc. By more intelligently providing reminders to the user, the above-described unforeseen circumstances can be dealt with. In some embodiments, an aggregation of various external data sources as well as internal data can be used to better predict when a user should be reminded of the time for their event, determine and advise whether they may be late regardless, and/or enable the user to arrange a delegate or replacement or to reschedule or cancel the event. | 09-22-2011 |
20110238779 | System and Method for Music Resource Connection, Selection and Rating for Providing a Radio Like User Listening Experience - A novel and useful system and method of automatic resource connection, selection and rating for providing a radio like listening experience to a user. The mechanism is operative to automatically establish a connection from a mobile communications device having media player capability to a music file collection. Playlists maintained on the device are periodically updated with new playlists downloaded to the device. The device generates playlists so as to eventually cycle though the entire contents of a music file collection. Users are given the ability to rate songs by title, artist, album, etc. These ratings are used to calculate scores for each song which are used to bias a random selection process for determining the next song to play. This provides a user with a radio like listening experience. | 09-29-2011 |
20110246762 | System and Method for Exchanging Cryptographic Protocol Capabilities - In some data communication configurations, data received from a sender may need to be viewed or otherwise processed by more than one entity with a corresponding client. For example, a message sent to a corporate email address may be viewed by either or both a mobile device and a desktop device. For the sender to utilize the strongest algorithm or protocol used by the recipient, it would therefore need to know which algorithms or protocols are supported by both the mobile and desktop mail clients. A system and method are provided to enable the mobile device to know about the capabilities of related mail clients associated with the communication address (e.g. email address) and vice versa such that the intersection of the capabilities (i.e. the strongest algorithm or protocol supported by all parties involved) can be chosen and the messages or data cryptographically processed accordingly. | 10-06-2011 |
20110307598 | AUTOMATED CALENDAR RECONCILIATION - There is provided a computer implemented method of providing data reconciliation on a first delegate device associated with an assigned task. The method comprises the steps of: determining a likelihood of failure of the first delegate device associated with the task defined in a first data entry thereon to complete the task, the first data entry associated with a start time and a task location; determining a replacement delegate device for completing the task in response to detecting task information for the replacement delegate device indicating suitability for the task; and updating respective data entries for the first delegate device and the replacement delegate device to associate the replacement delegate device for the task. | 12-15-2011 |
20110319074 | Method and apparatus for low cost cellular roaming - A wireless device (WD) is associated with a preprogrammed user roaming setting and an automated adjustment algorithm stored in operative communication with the device. The algorithm is initiated and run when the device enters a roaming area, thereby automatically activating the roaming setting. A user response query is operatively connected to the automated adjustment algorithm, and operates as a switch for the automated adjustment algorithm, which initiates changing the user settings in accordance with the roaming setting. A user available query is connected to the user response query, to determine if the wireless device is in use, and to generate a notification if the device is idle or a prompt if the device is in use. An output from the switch of the user response query selectively enables the automated adjustment algorithm responsive to at least one of a responsive and a nonresponsive input to the user response query. | 12-29-2011 |
20120079007 | METHOD, APPARATUS AND SYSTEM FOR ACCESSING APPLICATIONS AND CONTENT ACROSS A PLURALITY OF COMPUTERS - A method, apparatus and system for accessing applications and content across a plurality of computers is provided. In one aspect, a client machine and a mobile computing device are provided. The client machine is configured to execute a browser application. The mobile computing device is configured to host a web server application. When the client machine and the mobile computing device are connected, functions on the mobile computing device become available on the client machine via the interaction between the web server and the browser. When the client machine accesses an email or other message with referenced content, different portions of the system can be configured to select a particular pathway to actually fetch the content. | 03-29-2012 |
20120079008 | METHOD, APPARATUS AND SYSTEM FOR PROVIDING EVENT NOTIFICATIONS ACROSS A PLURALITY OF COMPUTERS - A method, apparatus and system for providing an event notification across a plurality of computers is provided. In one aspect, a client machine and a mobile computing device are provided. The client machine is configured to execute a browser application. The mobile computing device is configured to host a web server application. When the client machine and the mobile computing device are connected, functions on the mobile computing device become available on the client machine via the interaction between the web server and the browser. Further, events received at the mobile computing device are sent to the client machine in response to periodic requests from the client machine. | 03-29-2012 |
20120079043 | METHOD, APPARATUS AND SYSTEM FOR ACCESSING AN APPLICATION ACROSS A PLURALITY OF COMPUTERS - A method, apparatus and system for accessing an application across a plurality of computers is provided. In one aspect, a client machine and a mobile computing device are provided. The client machine is configured to execute a browser application. The mobile computing device is configured to host a web server application. When the client machine and the mobile computing device are connected, functions on the mobile computing device become available on the client machine via the interaction between the web server and the browser. | 03-29-2012 |
20120079063 | METHOD, APPARATUS AND SYSTEM FOR PROVIDING EVENT NOTIFICATIONS ACROSS A PLURALITY OF COMPUTERS - A method, apparatus and system for providing an event notification across a plurality of computers is provided. In one aspect, a client machine and a mobile computing device are provided. The client machine is configured to execute a browser application. The mobile computing device is configured to host a web server application. When the client machine and the mobile computing device are connected, functions on the mobile computing device become available on the client machine via the interaction between the web server and the browser. Further, events received at the mobile computing device are sent to the client machine in response to periodic requests from the client machine. | 03-29-2012 |
20120079110 | METHOD AND APPARATUS FOR DIFFERENTIATED ACCESS CONTROL - A method for differentiated access control on a computing device having a connection with a second device, the method checking whether a timer has expired on the second device or if a connection is lost to the second device; and preventing at least one of the plurality of application subsets from being launched or enabled if the timer has expired on the second device or the connection is lost to the second device. | 03-29-2012 |
20120079122 | DYNAMIC SWITCHING OF A NETWORK CONNECTION BASED ON SECURITY RESTRICTIONS - Systems and methods for providing access to an enterprise network from a remote computer are described. In one example, a system includes a mobile device configurable for connection to the remote computer, the mobile device adapted to establish secure communication to the enterprise network and a connection server application located on the mobile device for receiving a request from the remote computer specifying a location and a connection path and selectively providing to the remote computer access to the enterprise network via the mobile device based on the request. Other implementations are possible. | 03-29-2012 |
20120079582 | AUTHENTICATING AN AUXILIARY DEVICE FROM A PORTABLE ELECTRONIC DEVICE - This document discusses, among other things, a method for authenticating a browser executing on an auxiliary device with a web service executing on a portable electronic device. The method includes receiving a request for a resource from the browser, determining whether the request identifies a protected resource, and selectively authenticating the request based on whether the request identifies a protected resource. | 03-29-2012 |
20120079593 | System and Method For Hindering a Cold Boot Attack - A method for hindering a cold boot attack on a user equipment (UE) is provided. The method includes, in response to detection of the cold boot attack, executing prioritized security procedures. A user equipment (UE) is also provided that includes a processor configured to execute prioritized security procedures responsive to detection of a cold boot attack. | 03-29-2012 |
20120079609 | METHOD FOR ESTABLISHING A PLURALITY OF MODES OF OPERATION ON A MOBILE DEVICE - A method, device and system for establishing plural modes of operation on a mobile device, including: associating each application on the mobile device with one of a plurality of modes; and restricting access to data on the mobile device to only a subset of applications based on the mode associated for the each application. A system includes connection of an untrusted device to a trusted device and restricting data access for restricted data to a subset of trusted applications on the untrusted device. | 03-29-2012 |
20120223861 | CONTROLLING A GPS RECEIVER BY DETECTING MOTION BASED ON RADIOFREQUENCY SIGNAL TRACES - Operation of a satellite-based navigation-signal broadcast system receiver, such as a GPS receiver, on a wireless communications device is controlled by determining whether the device is stationary or in motion. Motion determination is accomplished by analyzing radiofrequency signal traces, e.g. GSM signal traces, received from one or more nearby base stations. A three-tiered analysis provides a progressively more accurate determination as to whether the device is moving or stationary while providing, in certain instances, a more rapid determination than prior-art techniques. When the device is determined to be stationary, the GPS receiver can be deactivated. When the device is determined to be moving, the receiver can be reactivated. | 09-06-2012 |
20120233681 | METHOD AND SYSTEM OF USER AUTHENTICATION USING A PORTABLE AUTHENTICATOR - Systems and methods are provided for facilitating access to an electronic device. Password information is stored on the electronic device, and on a portable authenticator. When a user attempts to access the electronic device, the user is prompted to enter a password at the electronic device. The portable authenticator determines the validity of the entered password. The electronic device receives the results of the validity determination from the portable authenticator, and provides access to the electronic device based on the received validity determination. | 09-13-2012 |
20120250470 | Electronic Device and Method Providing Improved Indication that an Alarm Clock is in an on Condition - An improved electronic device and method provide an improved clock feature having an alarm clock function that advantageously provides an indication to a user that the alarm is set, i.e., is in an ON condition, by outputting the alarm time itself. | 10-04-2012 |
20120311020 | Pre-Caching Resources Based on A Cache Manifest - A method executed on a first electronic device for accessing an application server on a second electronic device includes receiving a cache manifest for an application, the cache manifest identifying a resource item that can be pre-cached on the first electronic device, pre-caching the resource item as a cached resource item in a cache memory of the first electronic device prior to launching an application client on the first electronic device. The method further includes, upon launching the application client on the first electronic device, retrieving data from the application server, wherein the data includes content and a reference to the resource item, obtaining, from the cache memory, the cached resource item that corresponds to the resource item, and displaying an output based upon the content and the cached resource item. | 12-06-2012 |
20130007725 | METHOD, APPARATUS AND SYSTEM FOR TRANSMITTING AN APPLICATION USING A PLURALITY OF COMPUTERS - A method, apparatus and system for transmitting an application using a plurality of computers is provided. In one aspect, a computing machine and a mobile computing device are provided. The computing machine is configured to execute a browser application. The mobile computing device is configured to host a manager application. When the computing machine and the mobile computing device are connected, the manager application becomes available on the client machine so that transmitting of applications to the mobile computing device can be controlled by the computing machine. | 01-03-2013 |
20130067009 | SYSTEM AND METHOD FOR HANDLING ELECTRONIC MAIL MISMATCHES - A system and method for handling e-mail address mismatches between the address contained within a user's certificate or certificate chain, and the account address actually being used is disclosed. In order to resolve address mismatches a canonical or generic domain name or user name may, for example, be used as a lifelong address of a user that is contained in the user's certificate. Upon detection of an address mismatch, the system and method disclosed herein may automatically re-check the certificate or search for a certificate containing the canonical or generic domain name and/or user name to attempt to resolve the mismatch. | 03-14-2013 |
20130097239 | ENABLING CONTENT INTERACTION AT A CONNECTED ELECTRONIC DEVICE - A content item may be identified at a first electronic device with selection for the content item to be “opened” at a second electronic device. The first electronic device may instruct that the content item be displayed or otherwise made available for further interaction at the second electronic device. A web protocol session may be established between the first electronic device and the second electronic device to allow for an instruction message from the first electronic device to the second electronic device. Upon receiving a user interface command at the first electronic device, the user interface command indicating that the content item should be displayed at the second electronic device, the instruction message is sent to the second electronic device, via the web protocol session. As a result, the content item is caused to be displayed at the second electronic device. | 04-18-2013 |
20130133065 | SYSTEM AND METHOD OF INDICATING THE STRENGTH OF ENCRYPTION - A method and system are provided for secure messaging on mobile computing devices. The method and system provide for an indication of a security trust level associated with a security method used with an electronic message. | 05-23-2013 |
20130145150 | CODE SIGNING SYSTEM AND METHOD - A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or more specific application programming interfaces (APIs). A digital signature is provided to the requestor. The digital signature indicates authorization by a code signing authority for code of the requestor to access the one or more specific APIs. In one example, the digital signature is provided by the code signing authority or a delegate thereof. In another example, the code signing request may include one or more of the following: code, an application, a hash of an application, an abridged version of the application, a transformed version of an application, a command, a command argument, and a library. | 06-06-2013 |
20130145151 | Derived Certificate based on Changing Identity - A first device with a changing identity establishes a secure connection with a second device in a network by acting as its own certificate authority. The first device issues itself a self-signed root certificate that binds an identity of the first device to a long-term public key of the first device. The root certificate is digitally signed using a long-term private key, where the long-term public key and the long-term private key form a public/private key pair. The first device provides its root certificate to the second device in any trusted manner. The first device can then create a certificate for one or more short-term identities acquired by the first device and sign the newly-created certificate using the long-term private key. The first device can authenticate itself to the second device by sending the newly-created certificate to the second device. | 06-06-2013 |
20130145153 | METHOD AND DEVICE FOR SECURE NOTIFICATION OF IDENTITY - A system, methods and devices for the secure notification of an identity in a communications network. The methods include sending or receiving a communication including a hash of a certificate of a device to notify or detect the presence of the device in a network. Each certificate is associated with an identity which is excluded from the communication of the hash of the certificate. The received hash is compared to hashes of certificates stored in an electronic device to determine an identity. The identity may represent an electronic device or a user of the electronic device. | 06-06-2013 |
20130145165 | METHOD OF SENDING A SELF-SIGNED CERTIFICATE FROM A COMMUNICATION DEVICE - A method of sending a self-signed certificate from a communication device, the self-signed certificate being signed by the communication device. The method includes: receiving a communication in relation to establishing a session from a second communication device in proximity to said communication device, outputting on an output device of said communication device a certificate hash of the self-signed certificate or an address of where to obtain the certificate hash, and sending the self-signed certificate to said second communication device. The method may also include sending a broadcast message to announce a presence of the communication device. | 06-06-2013 |
20130145480 | E-MAIL WITH SECURE MESSAGE PARTS - A method for preventing a recipient of an electronically transmitted message from taking at least one action in relation to the message is disclosed. The message has at least two parts with one of the parts having a higher level of security than the other part. The method includes the step of extracting information from the message. The information indicates that the higher level security part is not permitted to have the action taken on it while the other part is so permitted. The method also includes the step of preventing the higher level security part from having the action taken on it in reaction to said recipient making an offending request. | 06-06-2013 |
20130160091 | SYSTEM AND METHOD FOR ASSOCIATING MESSAGE ADDRESSES WITH CERTIFICATES - A system and method for associating message addresses with certificates, in which one or more message addresses are identified and associated with a user-selected certificate that does not contain any e-mail addresses. In certain situations, a message may be encrypted using a certificate that does not contain an e-mail address that matches the e-mail address of the individual to which the message is to be sent, so long as the address to which the message is to be sent matches any of the message addresses associated with the certificate. The message addresses are saved in a data structure that resides in a secure data store on a computing device, such as a mobile device. | 06-20-2013 |
20130166907 | Trusted Certificate Authority to Create Certificates Based on Capabilities of Processes - A device certificate binds an identity of a first device to a public key of the first device. The first device comprises a certificate authority service that creates for a process on the first device a process certificate certifying one or more capabilities of the process on the first device. The process certificate is presented to the second device. Upon validating the process certificate using the device certificate, the second device permits the process on the first device to have on the second device one or more of the verified certified capabilities. | 06-27-2013 |
20130167194 | SYSTEM AND METHOD FOR DETERMINING A SECURITY ENCODING TO BE APPLIED TO OUTGOING MESSAGES - A device comprising a processor is disclosed herein. In one broad aspect, the processor is configured to: determine whether a general message encoding configuration setting at the device is set to a first setting indicating that when a security encoding is to be applied to a message, the security encoding is to be established by a policy engine, wherein the established security encoding cannot be overridden by a security encoding selection algorithm at the device; and if the general message encoding configuration setting is set to the first setting, transmit the message to at least one message recipient via the policy engine such that the policy engine applies the security encoding to the message prior to the policy engine transmitting the message. | 06-27-2013 |
20130167247 | SELECTIVELY WIPING A REMOTE DEVICE - A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level. | 06-27-2013 |
20130179148 | METHOD AND APPARATUS FOR DATABASE AUGMENTATION AND MULTI-WORD SUBSTITUTION - A method and communication device are provided for database augmentation using linguistic data stored on a device, and utilizing a database stored on a device to perform multi-word substitution. A database may be augmented by monitoring other databases that contain linguistic data, such as contact databases containing linguistic data regarding entities that a device may communicate with, and updating the database with linguistic data in the other databases. The linguistic data in the augmented database may be compared with words received from an input apparatus to determine whether any of the received words should be replaced with linguistic data from the augmented database. The augmented database may contain one word entries and multi-word entries to allow for multi-word substitution. | 07-11-2013 |
20130191220 | Systems and Methods for Displaying Over-Scroll Regions on Electronic Devices - A method and system are provided for displaying advertising content on a mobile device by displaying an over-scroll region on a display of the mobile device, and displaying a first advertisement in at least a first portion of the over-scroll region. The method may include determining information associated with the over-scroll region, and selecting the first advertisement based on the information associated with the over-scroll region. The method may also include displaying a second advertisement in a second portion of the over-scroll region and selecting the second advertisement based on the information associated with the over-scroll region. | 07-25-2013 |
20130198508 | SYSTEM AND METHOD FOR REMOTE RESET OF PASSWORD AND ENCRYPTION KEY - Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a public key from the device. The remote location uses the public key and a stored private key to generate a further public key. The further public key is sent to the device. The device uses the further public key to generate a key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key may then be created. | 08-01-2013 |
20130219471 | ESTABLISHING CONNECTIVITY BETWEEN AN ENTERPRISE SECURITY PERIMETER OF A DEVICE AND AN ENTERPRISE - A first device establishes a connection with a second device and attempts access, via the connection to an enterprise server of an enterprise. The first device may have a number of security perimeters, ones of which are allowed to use various communications proxies provided by the second device. If the first device and the second device are associated with a same common enterprise, an enterprise perimeter of the first device may be enabled to access the enterprise using an enterprise proxy of the second device. | 08-22-2013 |
20130227360 | Method and Apparatus for Providing Intelligent Error Messaging - A method and apparatus for providing intelligent error messaging is disclosed wherein a user of a mobile communications device is provided with descriptive error messaging information to assist the user in overcoming errors associated with the processing of electronic messages and data. | 08-29-2013 |
20130239225 | Deleting Confidential Information Used to Secure a Communication Link - A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link. The conditions include general timeout, device inactivity, loss of connection over the communication link, a decline in signal strength, and a predefined number of transactions having occurred between the first device and the second device. | 09-12-2013 |
20130246547 | SYSTEMS AND METHODS FOR PROTECTING HEADER FIELDS IN A MESSAGE - Embodiments of the systems and methods described herein facilitate the transmitting, receiving, and processing of encoded messages wherein the header fields in the message header are protected. In one embodiment, the contents of the header fields to be protected are inserted into the message body as one or more additional lines of text, for example, prior to encoding and transmitting the message to a message recipient. Upon receipt of the message, the message recipient processes the encoded message such that the contents of the protected header fields can be extracted from the message body. Accordingly, by inserting the contents of the header fields to be protected into the message body, the header fields may be protected using existing standards and protocols for facilitating secure message communication. | 09-19-2013 |
20130246549 | SYSTEM AND METHOD FOR SELECTING MESSAGING SETTINGS ON A MESSAGING CLIENT - A system and method of selecting messaging settings on a messaging client are provided. A display configured to operate in conjunction with the messaging client displays a compose screen that includes a message portion and a messaging settings portion when an outgoing message is to be composed on the messaging client. Messaging settings selected to control message characteristics of the outgoing message are displayed in the messaging settings portion of the compose screen. | 09-19-2013 |
20130247143 | SYSTEM AND METHOD FOR CONFIGURING DEVICES FOR SECURE OPERATIONS - Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices. Security mode configuration data is used in establishing a security-related mode of operation for the computing devices. | 09-19-2013 |
20130254528 | SECURE MESSAGE HANDLING ON A MOBILE DEVICE - Systems, methods, and software for providing digital security to a child message transmitted from a mobile device to a messaging server, where the mobile device typically does not transmit the parent message with the child message to the messaging server. Whether to apply digital security, such as encryption or a digital signature, or both, is determined, and if the mobile device does not include a complete copy of a parent message for insertion into the child message, the mobile device selectively downloads the parent message from the messaging server prior to the computation of a digital signature or prior to encryption. The systems and methods may also provide a check of the child message size, when the child message includes inserted parent content, to ensure that the child message does not exceed any prescribed limits on message size. | 09-26-2013 |
20130268607 | SYSTEM AND METHOD FOR HANDLING ELECTRONIC MAIL MISMATCHES - A system and method for handling e-mail address mismatches between the address contained within a user's certificate or certificate chain, and the account address actually being used is disclosed. In order to resolve address mismatches a canonical or generic domain name or user name may, for example, be used as a lifelong address of a user that is contained in the user's certificate. Upon detection of an address mismatch, the system and method disclosed herein may automatically re-check the certificate or search for a certificate containing the canonical or generic domain name and/or user name to attempt to resolve the mismatch. | 10-10-2013 |
20130282848 | SYSTEMS AND METHODS FOR PROTECTING HEADER FIELDS IN A MESSAGE - Embodiments of the systems and methods described herein facilitate the transmitting, receiving, and processing of encoded messages wherein the header fields in the message header are protected. In one embodiment, the contents of the header fields to be protected are inserted into the message body as one or more additional lines of text, for example, prior to encoding and transmitting the message to a message recipient. Upon receipt of the message, the message recipient processes the encoded message such that the contents of the protected header fields can be extracted from the message body. Accordingly, by inserting the contents of the header fields to be protected into the message body, the header fields may be protected using existing standards and protocols for facilitating secure message communication. | 10-24-2013 |
20130318344 | SYSTEM AND METHOD FOR PROCESSING ENCODED MESSAGES FOR EXCHANGE WITH A MOBILE DATA COMMUNICATION DEVICE - A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device, the message is processed so as to modify the message with respect to one or more encryption and/or authentication aspects. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a host system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the host system to one or more receivers. | 11-28-2013 |
20140068741 | AUTHENTICATING AN AUXILIARY DEVICE FROM A PORTABLE ELECTRONIC DEVICE - This document discusses, among other things, a method for authenticating a browser executing on an auxiliary device with a web service executing on a portable electronic device. The method includes receiving a request for a resource from the browser, determining whether the request identifies a protected resource, and selectively authenticating the request based on whether the request identifies a protected resource. | 03-06-2014 |
20140075191 | SYSTEM AND METHOD FOR TRANSMITTING AND UTILIZING ATTACHMENTS - A method of handling cryptographic information in a communication comprising body elements and attachment elements to a mobile device includes the steps of determining if the communication includes an attachment element comprising cryptographic information and converting the attachment element into a body element upon determining that the communication includes an attachment element comprising cryptographic information. | 03-13-2014 |
20140115665 | MESSAGE-HANDLING SERVER AND METHOD FOR HANDLING SECURE MESSAGE ATTACHMENTS FOR A MOBILE DEVICE - A secure message that includes an attachment is received at a server. The secure message may have a secure layer that indicates that the secure message is at least digitally signed. The secure message may be provided without the attachment to the mobile device over a wireless network. A request may be received from the mobile device to access the attachment. The request may include an attachment identifier (ID) that identifies the attachment in accordance with a message-attachment indexing system. In response to the request to access the attachment, the server may perform an index lookup to find the attachment based upon the attachment ID, may look through the secure layer of the secure message in order to locate the attachment within the secure message, and may render at least an initial portion of the attachment by the server in a format for viewing by the mobile device. | 04-24-2014 |
20140237246 | Generating a Symmetric Key to Secure a Communication Link - A symmetric key to be used to secure a communication link between a first device and a second device is generated as follows: a first symmetric key is generated; a second symmetric key is generated; packets communicated between the first device and the second device over communication link are hashed to create a hash result; the first symmetric key, the second symmetric key and the hash result are hashed to generate a third symmetric key to be used to secure the communication link. | 08-21-2014 |
20140253574 | Development Environment For Capture Of Image Data From A Mobile Device - A method and device for acquiring an image such as a splash screen for an application. A screenshot instruction is sent to a target device upon detecting a trigger event; image data is received from the target device in response to the screenshot instruction; and upon receiving the image data, the image data is automatically stored and associated with the application. | 09-11-2014 |
20140258894 | Visual Timeline Of An Application History - The present disclosure provides methods and devices for interacting with a visual timeline of an application. The method comprises displaying on a display a visual timeline having one or more visual elements each representing an action performed in respect of the application, each action corresponding to a save point or an incremental change to the application, wherein the visual elements are arranged in a chronological order in which the actions occurred. An application state for display within an editor user interface can be selected using the visual timeline. | 09-11-2014 |
20140258968 | Visual Representation Of Edits For Collaborative Application Development - The present disclosure provides a method and device of distributing visual representation of changes to an application. The method includes: determining one or more pages in the application which have changed between a first state of the application at a first time and second state of the application at a second time; rendering the one or more pages which have changed at the first state of the application; rendering the one or more pages which have changed at the second state of the application; and sending a notification including a visual differential of one or more rendered pages of the application which have changed between the first state of the application and the second state of the application. | 09-11-2014 |
20140258969 | Web-Based Integrated Development Environment For Real-Time Collaborative Application Development - The present disclosure provides methods and devices for real-time collaboration on an application under development among two or more collaborating devices. A server maintains the application code for the application. Changes to the application, which may be additions, deletions or modifications, made by the collaborating devices are sent to the server. The server distributes the changes to other collaborating devices in real-time or near real-time, which update the current state of the application to reflect the changes. | 09-11-2014 |
20140258970 | COLLABORATIVE APPLICATION DEVELOPMENT ENVIRONMENT USING A CONNECTED DEVICE - The present disclosure provides a Web-based integrated development environment and graphical user interface for real-time collaborative application development which uses a connected device. Changes made to an application within the application development tool are applied to a connected mobile device in real-time or near real-time application. | 09-11-2014 |
20140297516 | METHOD FOR PROVIDING COMPOSITE USER INTERFACE CONTROLS AND AN ONLINE STOREFRONT FOR SAME - The present disclosure provides a method for providing composite user interface controls and a library or online storefront for same. In one aspect, there is provided a method for a client computer of sharing a custom control, comprising: receiving by a browser an encrypted custom control comprising a number of user interface elements which are positioned in a specified manner with respect to each other, wherein each of the user interface elements has one or more properties; receiving by the browser a decryption key; and decrypting by the browser the encrypted custom control using the decryption key. | 10-02-2014 |
20140320387 | Device, System and Method for Generating Display Data - A method for use in a device is described. The method comprising the steps of detecting a gesture at the device; and outputting data, to a remote device, for controlling a display object on a portion of a display generated by the remote device, wherein the display object is controlled in response to the detected gesture performed at the device, and wherein the data pertains to an application executable on the device. A device is also described. | 10-30-2014 |
20140324962 | Device, System and Method for Utilising Display Objects - A method of generating a display object is provided, the method comprising operating a first processor comprised within a first device to: execute an application; generate an display object associated with the application; output the active display object on the first device; transmit the display object to a second device for output by the second device; and receive user input to the application via the display object output on the second device. | 10-30-2014 |
20140325382 | Device, System And Method For Processing Character Data - A method is described. The method comprising: receiving character data from the remote device in response to a user applying the character data to a displayed target; and supplying the character data to one of a plurality of components executable on a processor of a device based on one or more characters in the character data. A device is also described. | 10-30-2014 |
20140325383 | Device, System And Method For Processing Character Data - A method is described. The method comprising the steps of receiving character data from the remote device following a selection of character data for application to a target; and determining, based on one or more characters in the character data, one or more components executable on the processor for supplying the character data thereto. A device is also described. | 10-30-2014 |
20140337619 | Derived Certificate based on Changing Identity - A first device with a changing identity establishes a secure connection with a second device in a network by acting as its own certificate authority. The first device issues itself a self-signed root certificate that binds an identity of the first device to a long-term public key of the first device. The root certificate is digitally signed using a long-term private key, where the long-term public key and the long-term private key form a public/private key pair. The first device provides its root certificate to the second device in any trusted manner The first device can then create a certificate for one or more short-term identities acquired by the first device and sign the newly-created certificate using the long-term private key. The first device can authenticate itself to the second device by sending the newly-created certificate to the second device. | 11-13-2014 |
20140351599 | SYSTEM AND METHOD FOR UPDATING MESSAGE TRUST STATUS - Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system performs signature verification of an encoded message and provides, together with the message, an indication to the mobile device that the message has been verified. In addition, the server provides supplemental information, such as, for example, a hash of the certificate or certificate chain used to verify the message, to the device, to enable the device to perform additional checks on the certificate, such as, for example, validity checks, trust checks, strength checks, or the like. | 11-27-2014 |
20140358675 | CLICK DETECTION METHOD, APPARATUS AND SYSTEM - A click detection method, apparatus and system is provided. An embodiment includes a method that receives a request from a client destined for a server and a unique identifier for the client. The method also includes generating a representation of the unique identifier, and forwarding the representation of the unique identifier and the request to the server. | 12-04-2014 |
20140359274 | SYSTEM AND METHOD FOR EXCHANGING ENCRYPTION KEYS BETWEEN A MOBILE DEVICE AND A PERIPHERAL DEVICE - Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In some embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security. | 12-04-2014 |
20140359293 | METHOD AND DEVICE FOR SECURE NOTIFICATION OF IDENTITY - A system, methods and devices for the secure notification of an identity in a communications network. The methods include sending or receiving a communication including a hash of a certificate of a device to notify or detect the presence of the device in a network. Each certificate is associated with an identity which is excluded from the communication of the hash of the certificate. The received hash is compared to hashes of certificates stored in an electronic device to determine an identity. The identity may represent an electronic device or a user of the electronic device. | 12-04-2014 |
20150016612 | SYSTEM AND METHOD FOR REMOTE RESET OF PASSWORD AND ENCRYPTION KEY - Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a public key from the device. The remote location uses the public key and a stored private key to generate a further public key. The further public key is sent to the device. The device uses the further public key to generate a key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key may then be created. | 01-15-2015 |
20150089005 | METHOD AND ELECTRONIC DEVICE FOR CONTENT SHARING - Methods and apparatus for enabling content interaction at a connected electronic device re described. An example method includes establishing a web protocol session between a web server executing on a first electronic user device and a client executing on a second electronic user device via a direct radio frequency connection between the first electronic user device and the second electronic user device, wherein the first electronic user device and the second electronic user device are associated with a same user, the establishing including sending an open request from the client to the web server; and transmitting a response to the open request from the web server to the client, the response including a universal resource identifier identifying a location of content for presenting, on the second electronic device, the application executing on the first electronic device. | 03-26-2015 |