Patent application number | Description | Published |
20120110097 | Forwarding E-Mail Message Attachments From a Wireless Device - A system and method of forwarding an e-mail from a wireless device is provided. The wireless device receives the e-mail message in portions as needed, the portions having the attachments contained therein. The portions of the e-mail message containing only a subset of attachments associated with the e-mail message in the user mailbox. When a wireless device forwards the e-mail message to one or more recipients a message identifier and an attachment indicator is provided for identifying the number of attachments in the e-mail message to be forwarded. The identified e-mail message is retrieved and the attachments are extracted from the retrieved e-mail message based on the attachment indicator. The e-mail message is forwarded to the one or more recipients and the extracted attachments. | 05-03-2012 |
20120118951 | SYSTEM AND METHOD FOR IMPROVING SMART CARD READER RECONNECTIONS - Communications between a computing device and a smart card reader (SCR) configured for communication with a smart card are facilitated through the use, by the computing device, of a smart card resource manager and a smart card reader service (SCRS). The SCRS acts as a relay for commands between the smart card resource manager and the SCR. Appropriate configuration of the SCRS obviates a redundant downloading of certificates from smart card to computing device subsequent to loss of a connection between the computing device and the SCR. However, upon re-establishing a previously lost connection to a SCR and determining that a communication link between a smart card and the SCR has been ended and reestablished during the loss of connection, the SCRS may indicate to the smart card resource manager that smart card is absent and, subsequently, that the smart card is present. | 05-17-2012 |
20120128156 | CROSS-COMPONENT CRYPTOGRAPHIC MESSAGE SYNTAX MESSAGE CONSTRUCTION - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for confidentiality or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, construct a cryptographic message syntax message. | 05-24-2012 |
20120131346 | SECURING PRIVATE KEY ACCESS FOR CROSS-COMPONENT MESSAGE PROCESSING - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, sign the composite message. Since signing the composite message involves access to a private key, access to that private key is secured such that such access to the private key can only be arranged responsive to an explicit request for a hash that is to be signed using the private key. | 05-24-2012 |
20120140927 | CROSS-COMPONENT MESSAGE ENCRYPTION - Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, encrypt and sign the composite message. Conveniently, security considerations are maintained even in view of bandwidth optimization measures. | 06-07-2012 |
20120233252 | HANDLING RECEIPTS IN CROSS COMPONENT MESSAGE PROCESSING - By automatically obtaining the entirety of a received message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, sign the composite message. In both the above contexts, handling message receipts when message processing ahead of message transmission involved more than one component may be facilitated by storing appropriate expected receipt content during the message processing, either on the device or the server. Validation of the receipt can then be accomplished through use of the stored expected receipt content in a manner that retains the benefits of message processing ahead of message transmission that involves more than one component. | 09-13-2012 |
20120235798 | SMART CARD SESSION OPTIMIZATION - A command destined for a smart card is received. If the command is of a state-altering type that places the smart card in a known state, it is relayed to a smart card reader unless the smart card is currently in the known state. If the command is a POWER OFF command, it is relayed to the smart card reader unless (i) the smart card is currently in the known state and (ii) within a predetermined time from receiving the command, a subsequent command of the state-altering type that places the smart card in the known state is received. If the command is not a POWER OFF command and is not of the state-altering type that places the smart card in the known state, it is relayed to the smart card reader. The command is discarded if not relayed to the smart card reader. | 09-20-2012 |
20120238206 | COMMUNICATIONS DEVICE PROVIDING NEAR FIELD COMMUNICATION (NFC) SECURE ELEMENT DISABLING FEATURES RELATED METHODS - A communications device may include a near field communication (NFC) device, at least one memory configured to store secure application data to be communicated via the NFC device and a secure element (SE) application programming interface (API) associated with the secure application data, and a processor coupled with the NFC device and the at least one memory. The processor may be configured to disable the SE API to prevent access to the secure application data based upon a security condition, and enable the SE API to allow access to the secure application data based upon a security restore event. | 09-20-2012 |
20120238207 | MOBILE WIRELESS COMMUNICATIONS DEVICE HAVING A NEAR FIELD COMMUNICATION (NFC) DEVICE AND PROVIDING MEMORY ERASURE AND RELATED METHODS - A mobile wireless communications device may include a wireless transceiver, a processor coupled with the wireless transceiver, and a near-field communication (NFC) device coupled with the processor. The NFC device may include an NFC controller, an NFC transceiver coupled with the NFC controller, and a first memory coupled with the NFC controller. The first memory may be configured to store at least one first application. The mobile wireless communications device may also include a second memory coupled to the processor and configured to store at least one second application. The processor may be configured to disable the NFC transceiver based upon a security condition, disable access to the at least one first application, erase the at least one second application, perform reset operation, and erase the at least one application from the first memory after the reset operation. | 09-20-2012 |
20120260097 | SYSTEM AND METHOD OF SIGNING A MESSAGE - A system and method of signing a message to be sent from a first communication device to a destination via a second communication device. The message includes a first portion on the first communication device and a second portion on the second communication device. The method includes receiving at the second communication device the first portion of the message and a first signature for the first portion from the first communication device; combining the first portion and the second portion to form the message; obtaining a second signature for the message; and sending the first signature, the second signature and the message from the second communication device to the destination. | 10-11-2012 |
20120278620 | Forwarding E-Mail From A Wireless Device - A system and method of sending an e-mail message associated with a wireless device is provided. A request to forward or reply to an original e-mail message is sent from the wireless device to a server. The request contains one or more recipients and includes a message identifier of an original e-mail message. A portion indicator is provided for retrieving portions of the original e-mail message identified by the message identifier. An e-mail message is sent to the one or more recipients comprising any added user text and the one or more retrieved portions of the original e-mail message such that text of the original message that the user may not be aware is not forwarded to new recipients. | 11-01-2012 |
20120286039 | SECURE USE OF EXTERNALLY STORED DATA - A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response APDU, wherein the filtered response APDU does not include the authentication data. Beneficially, when the smart card reader transmits the filtered response APDU toward a destination, the biometric template data is less susceptible to interception, thereby providing a more secure solution. | 11-15-2012 |
20120297093 | SMART CARD SET PROTOCOL OPTIMIZATION - A method of facilitating communications between a computer device and a smart card reader having an associated smart card, the computer device including a smart card resource manager and a smart card reader service, the smart card reader service acting as a relay for commands between the smart card resource manager and the smart card reader, the method comprising: receiving from the smart card resource manager a first command for setting a protocol for communications with the smart card; and responding, prior to receiving a reply from the smart card to the first command, to the smart card resource manager with a message indicating that the smart card has successfully received the first command. | 11-22-2012 |
20120326861 | ANTICIPATORY RESPONSES TO COMMANDS - Responsive to intercepting an outbound command, a command interceptor may, upon determining that the command is associated with a particular category of commands, transmit an anticipatory response to the source of the command, for example, to prematurely indicate that the command has met with success. Accordingly, a given application whose further execution is dependent upon the successful completion of the command may further execute earlier than would be the case if the given application was to await the transmission of the command, the generation of a response indicating success and the receipt of the response indicating success. | 12-27-2012 |
20130008946 | SYSTEM AND METHOD FOR IMPROVING SMART CARD READER RECONNECTIONS - Upon recognizing a loss of a first connection to a computing apparatus, such as a personal computer, a smart card reader may maintain an open session with a smart card and may associate an identity of the computing apparatus of the first connection with the open session. Some time later, the smart card reader may establish a second connection with a computing apparatus. The smart card reader may compare an identity of the computing apparatus of the second connection with the identity of the computing apparatus of the first connection. Responsive to determining that the identities do not match, the smart card reader may close the open session with the smart card. Responsive to determining that the identities do match, the smart card reader may maintain the open session with the smart card. | 01-10-2013 |
20130041830 | METHODS AND APPARATUS TO PROVISION PAYMENT SERVICES - Methods and apparatus to provision payment services are disclosed. An example method includes receiving an indication of a service to be provisioned to a mobile device, generating a token indicative of the service, wherein the token includes a cryptographically signed portion that was cryptographically signed by a secure element of the mobile device, sending the token to an entity for verification, and provisioning the service when the token is verified. | 02-14-2013 |
20130102246 | MOBILE COMMUNICATIONS DEVICE PROVIDING NFC APPLET COMPATIBILITY FEATURES AND RELATED METHODS - A mobile communications device may include a near field communication (NFC) device, and a processor coupled with the NFC device. The processor may be configured to operate a first NFC applet and a second NFC applet, determine whether concurrent enabling of the first NFC applet and the second NFC applet will cause a compatibility conflict, and concurrently enable the first NFC applet and the second NFC applet for communicating data via the NFC device based upon a determination that concurrent enabling of the first NFC applet and the second NFC applet will not cause the compatibility conflict. | 04-25-2013 |
20130104196 | RESTRICTING ACCESS TO HARDWARE FOR WHICH A DRIVER IS INSTALLED ON A COMPUTER - Users of a computer are prevented from directly accessing certain hardware for which a driver is installed on the computer. The users are provided a limited, indirect manner to access the hardware for a specific purpose or to do a specific job. One example of such hardware is a wireless hardware communication interface. The wireless activity of the computer may be restricted so that the wireless hardware communication interface is prevented from communicating with any devices compatible with the wireless hardware communication interface other than one or more specific devices. | 04-25-2013 |
20130109308 | MOBILE COMMUNICATIONS DEVICE PROVIDING SECURE ELEMENT DATA MANAGEMENT FEATURES AND RELATED METHODS | 05-02-2013 |
20130111598 | MOBILE COMMUNICATIONS DEVICE PROVIDING SECURE ELEMENT DATA WIPING FEATURES AND RELATED METHODS | 05-02-2013 |
20130138951 | METHOD AND DEVICE FOR AUTOMATICALLY DISTRIBUTING UPDATED KEY MATERIAL - A method for handling an encrypted message received on an electronic device that has not been encrypted using a current public key. The portable electronic device automatically generates a reply message to the sender in response to determining that the message has not been encrypted with the current public key. The reply message may contain the current public key of the recipient device, and may request the sender to resend the message encrypted with the current public key. | 05-30-2013 |
20130152185 | TRANSACTION PROVISIONING FOR MOBILE WIRELESS COMMUNICATIONS DEVICES AND RELATED METHODS - A mobile communications device may include a memory, a transceiver, and a controller coupled with the memory and the transceiver. The controller may be capable of receiving first authentication data from a security token via communication with the security token, where the first authentication data is associated with an account. The controller may also be capable of transmitting the first authentication data via the transceiver, and receiving second authentication data via the transceiver, where the second authentication data is also associated with the account. The controller may be further capable of storing the second authentication data in the memory, and transmitting a transaction request using the second authentication data. | 06-13-2013 |
20130160134 | METHOD AND DEVICE FOR MANAGING A SECURE ELEMENT - A method and system for managing, from a communication device, a secure element for contactless transactions such as mobile payment applications. The communication device includes a memory for storing one or more device applications. The method includes determining that an application stored on the secure element does not have an association with any of the device applications, and in response to the determining, sending a communication to a server to delete the application from the secure element. | 06-20-2013 |
20130171929 | MOBILE COMMUNICATIONS DEVICE PROVIDING NEAR FIELD COMMUNICATION (NFC) CARD ISSUANCE FEATURES AND RELATED METHODS - A communications system may include a provisioning terminal comprising a first near field communications (NFC) device, where the provisioning terminal is capable of communicating with a provisioning server. The system may further include a mobile communications device comprising a second NFC device, a processor capable of providing a mobile wallet interface, a memory, and a memory controller coupled with the second NFC device, the memory, and the processor. The memory controller may be capable of receiving an applet and associated mobile wallet interface data from the provisioning server via the provisioning terminal based upon NFC communication between the first NFC device and the second NFC device, storing the applet and the associated mobile wallet interface data in the memory, and sending the mobile wallet interface data from the memory to the processor for the mobile wallet interface. | 07-04-2013 |
20130173455 | MOBILE COMMUNICATIONS DEVICE PROVIDING NEAR FIELD COMMUNICATION (NFC) SECURITY FEATURES AND RELATED METHODS - A mobile communications device may include a near field communication (NFC) device, a movement determining device, and a processor coupled with the NFC device and the movement determining device. The processor may be capable of selectively switching between a first operating mode, in which the NFC device is enabled for NFC communication, and an second operating mode. The processor may also be capable of, when switched to the unsecure operating mode, enabling the NFC device for NFC communication until the mobile communications device moves beyond a threshold distance based upon the movement determining device. | 07-04-2013 |
20130173736 | COMMUNICATIONS SYSTEM PROVIDING ENHANCED TRUSTED SERVICE MANAGER (TSM)VERIFICATION FEATURES AND RELATED METHODS - A trusted service manager (TSM) server may include at least one communications device capable of communicating with at least one application server, a verification database server, and at least one mobile communications device. The TSM server may further include a processor coupled with the at least one communications device and capable of registering the at least one application server with the verification database server, receiving a request from the at least one application server to access the memory of the mobile communications device, cooperating with the verification database server to verify the at least one application server based upon the access request and based upon registering of the at least one application server, and writing application data from the at least one application server to the memory of the at least one mobile communications device based upon verifying the at least one application server. | 07-04-2013 |
20130214908 | SMART CARD SESSION OPTIMIZATION - A command destined for a smart card is received. If the command is of a state-altering type that places the smart card in a known state, it is relayed to a smart card reader unless the smart card is currently in the known state. If the command is a POWER OFF command, it is relayed to the smart card reader unless (i) the smart card is currently in the known state and (ii) within a predetermined time from receiving the command, a subsequent command of the state-altering type that places the smart card in the known state is received. If the command is not a POWER OFF command and is not of the state-altering type that places the smart card in the known state, it is relayed to the smart card reader. The command is discarded if not relayed to the smart card reader. | 08-22-2013 |
20130283054 | SYSTEM , METHOD AND APPARATUS FOR OPTIMIZING WIRELESS COMMUNICATIONS OF SECURE E-MAIL MESSAGES WITH ATTACHMENTS - A system, method and apparatus are provided for secure e-mail message attachment optimization. Content attached to e-mail messages may not be suited to the resource constraints of the destination wireless device. In secure e-mail messages, the message may be signed and/or encrypted. A wireless server can determine resource parameters associated with a destination wireless device, such as display resolution, memory capacity, processor speed, and wireless interface constraints and re-scale the attached content to be optimized for delivery and presentation on the wireless device. | 10-24-2013 |
20140013121 | METHOD AND DEVICE FOR STORING SECURED SENT MESSAGE DATA - Methods and devices for storing sent message data are described. The sent message data corresponds to a message sent to a destination by a communication device via a server. The method includes compiling a first portion of the message which has a plurality of components; applying security encoding to the first portion; and storing the first portion. The first portion includes at least one but not all of the plurality of components in the message, and pointers to the components not included in the first portion. A method of verifying sent message data on a communication device is also described. | 01-09-2014 |
20140154975 | Verifying a Wireless Device - In some aspects of what is described here, a first wireless device detects proximity of a second wireless device (e.g., by a Near Field Communication (NFC) interface or another type of interface). Based on detecting proximity of the second wireless device, the first wireless device generates a recommendation request from information received from the second wireless device. The first wireless device sends the recommendation request to a trusted authority and receives a response. The response includes the trusted authority's recommendation whether to trust the second wireless device. The first wireless device can determine whether to trust the second wireless device based on the recommendation. | 06-05-2014 |
20140258722 | Forwarding E-Mail From A Wireless Device - A system and method of sending an e-mail message associated with a wireless device is provided. A request to forward or reply to an original e-mail message is sent from the wireless device to a server. The request contains one or more recipients and includes a message identifier of an original e-mail message. A portion indicator is provided for retrieving portions of the original e-mail message identified by the message identifier. An e-mail message is sent to the one or more recipients comprising any added user text and the one or more retrieved portions of the original e-mail message such that text of the original message that the user may not be aware is not forwarded to new recipients. | 09-11-2014 |
20140372298 | COMMUNICATION SYSTEM WITH DIGITAL WALLET HAVING BLANK USER CARD AND RELATED METHODS - A mobile wireless communications device may communicate with a terminal including a first NFC device, the terminal being capable of receiving data from a provisioning server. The mobile wireless communications device may include a housing, a wireless transceiver carried by the housing, a second NFC device carried by the housing, a memory carried by the housing, a display carried by the housing, and a processor carried by the housing and coupled to the wireless transceiver, the second NFC device, the memory, and the display. The processor may be configured to implement a digital wallet including user cards, receive from the terminal, via the second NEC device, a blank user card including user data fields, and fill the user data fields of the blank user card to define a completed user card and send the completed user card to the provisioning server. | 12-18-2014 |
20140372299 | MOBILE WIRELESS COMMUNICATIONS DEVICE HAVING DIGITAL WALLET WITH MULTI-MODE USER CARD AND RELATED METHODS - A mobile wireless communications device may include a housing, a wireless transceiver carried by the housing, a memory carried by the housing, a display carried by the housing, and a processor carried by the housing. The processor may be configured to implement a digital wallet including a multi-mode user card having first and second user interface modes, and selectively change the multi-mode user card from the first user interface mode to the second user interface mode based upon a current location, a current time, or a determined event. The second user interface mode may include one or more of a mapping interface mode, a survey interface mode, or a purchase interface mode. | 12-18-2014 |