Patent application number | Description | Published |
20080243525 | SYSTEM AND METHOD FOR MANAGEMENT OF A PORTABLE ELECTRONIC DEVICE - A system and method for management of a portable electronic device is provided. An embodiment includes a system that comprises a portable electronic device that is wirelessly connectable to a carrier administrative server and an enterprise administrative server. The portable electronic device maintains a policy that defines how upgrade requests are to be managed. The policy can define, for example, whether or not the carrier administrative server is permitted to instruct the portable electronic device to install upgrades. | 10-02-2008 |
20090112978 | CLICK DETECTION METHOD, APPARATUS AND SYSTEM - A click detection method, apparatus and system is provided. An embodiment includes a method that receives a request from a client destined for a server and a unique identifier for the client. The method of the method also includes generating a representation of the unique identifier, and forwarding the unique identifier and the request to the server. | 04-30-2009 |
20090219166 | VISUAL EVENT NOTIFICATION ON A HANDHELD COMMUNICATIONS DEVICE - A method of event notification on a handheld communications device involves first receiving an indication of an occurrence of an event at the handheld communications device. The communications device comprises a display device, and the event has an associated notification definition for providing a visual notification of the occurrence of the event. The notification definition comprises a content parameter that specifies a scope of the content of the visual notification, and an action parameter that specifies the action to be taken on the communications device after the visual notification is initiated. Then, a visual notification of the occurrence is provided on the display device in accordance with the associated notification definition. The visual notification provides particulars of the event. | 09-03-2009 |
20100026608 | REMOTE DESKTOP CLIENT PEEPHOLE MOVEMENT - A method and apparatus for controlling a first display module is provided, the first display module associated with a client device in communication with a server enabled to generate data for display on a second display module having a screen size larger than a screen size of the first display module, the data having an active area. Data is received at the client device. The first display module is controlled to generate a representation of a first portion of the data including the active area, the representation of the first portion representative of a peephole superimposed on the second display module, the peephole less than or equal to a size of a screen of the first display module. Input indicative that the peephole is to be shifted to an edge of the active area is received. The first display module is controlled to generate a representation of a second portion of the data including the edge, such that the peephole is shifted to the edge of the active area. | 02-04-2010 |
20100031028 | SYSTEMS AND METHODS FOR SELECTING A CERTIFICATE FOR USE WITH SECURE MESSAGES - Systems and methods for selecting a certificate for use in securing a message to be transmitted from a computing device is described herein. A set of certificates is determined and the certificates are ranked based on one or more predetermined ranking criteria. At least the highest ranking certificate is displayed, and a certificate is selected for securing the message. | 02-04-2010 |
20100187309 | Answer To Reset (ATR) Pushing - A wireless-enabled smart card reader receives an Answer to Reset (ATR) from a smart card and transmits the ATR using a wireless communication link to a computing device without waiting for an ATR request from the computing device. The computing device may cache the ATR and use it for subsequent communication sessions with the smart card. | 07-29-2010 |
20100197366 | INTERFACE AND COMMUNICATION PROTOCOL FOR A MOBILE DEVICE WITH A SMART BATTERY - Various embodiments are described herein for a mobile communication device that utilizes a smart battery. The mobile device includes a main processor for controlling the operation of the mobile communication device. The smart battery is coupled to the main processor and provides supply power. The smart battery includes a battery processor for controlling the operation of the smart battery and communicating with the main processor, and a battery module having one or more batteries for providing the supply power. A battery interface is provided for coupling between the main processor and the battery processor for providing communication therebetween. The battery interface comprises a data communication line and protection circuitry for protecting the main processor from electrostatic discharge. A communication protocol is also provided for communication between the main processor and the battery processor. | 08-05-2010 |
20100197367 | INTERFACE AND COMMUNICATION PROTOCOL FOR A MOBILE DEVICE WITH A SMART BATTERY - Various embodiments are described herein for a mobile communication device that utilizes a smart battery. The mobile device includes a main processor for controlling the operation of the mobile communication device. The smart battery is coupled to the main processor and provides supply power. The smart battery includes a battery processor for controlling the operation of the smart battery and communicating with the main processor, and a battery module having one or more batteries for providing the supply power. A battery interface is provided for coupling between the main processor and the battery processor for providing communication therebetween. The battery interface comprises a data communication line and protection circuitry for protecting the main processor from electrostatic discharge. A communication protocol is also provided for communication between the main processor and the battery processor. | 08-05-2010 |
20100317324 | AUTOMATIC SECURITY ACTION INVOCATION FOR MOBILE COMMUNICATIONS DEVICE - A mobile communications device, method and computer program product for providing security are described. In one embodiment, the device comprises: a processor; a communications subsystem; a storage element having application modules and data; and a security module operable to detect a locked state of the device and initiate a lockout data protection timer for a predetermined duration upon detection of the locked state. The security module is operable to, after the lockout data protection timer has been initiated, detect if a password is entered through a user input device within the predetermined duration and to terminate the lockout data protection timer if entry of the password is detected to perform a security action comprising erasing or encrypting at least some of the data if entry of the password is not detected. | 12-16-2010 |
20110084136 | ALERTING A SMART CARD READER OF PROBABLE WIRELESS COMMUNICATION - A wireless device may alert a wireless smart card reader that communication of data between the wireless device and the wireless smart card reader is probably imminent by sending an activation alert. Upon receipt of the activation alert, if the wireless smart card reader is in a low-power state, the wireless smart card reader may enter a higher-power state. If the wireless smart card reader is in the higher-power state upon receipt of the activation alert, the wireless smart card reader may remain in the higher-power state until a timeout period has expired. The wireless device may instruct the wireless smart card reader to enter the low-power state by sending a deactivation alert if the wireless device detects that communication of data between the wireless device and the wireless smart card reader is not likely to occur within a specified period of time. | 04-14-2011 |
20110126262 | SPECIFYING A SET OF FORBIDDEN PASSWORDS - Various embodiments are described for providing password approval on a device. The password approval includes getting the user password, generating at least one symbolically equivalent password and then comparing the at least one symbolically equivalent password with at least one specified forbidden password. The user password is disapproved if one of the symbolically equivalent passwords corresponds to the at least one forbidden password. | 05-26-2011 |
20110191585 | Device Authentication - Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of authentication values from the first device to the second device using the third device. Similarly, there is communication of values from the second device to the first device using the third device. The third device retains the communicated values. The values are calculated to permit the third device to authenticate the first and second devices without the third device receiving the shared secret value. The authentication may be used to establish a communications channel between the first and the second devices. | 08-04-2011 |
20110321171 | Deleting Confidential Information Used to Secure a Communication Link - A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link. | 12-29-2011 |
20120046015 | BATTERY PACK AUTHENTICATION FOR A MOBILE COMMUNICATION DEVICE - Various embodiments are described herein for a mobile communication device that authenticates a smart battery prior to use. The mobile device includes a main processor and a device memory. The device memory stores first and second portions of security information used for authentication. The smart battery includes a battery processor and a battery memory. The battery memory stores a third portion of security information used for authentication. The main processor sends an authentication request including the first portion of security information to the battery processor, and the battery processor generates a response based on the first and third portions of security information and sends the generated response to the main processor. The smart battery is authenticated if the generated response matches the second portion of security information. | 02-23-2012 |
20120160909 | Answer To Reset (ATR) Pushing - A smart card reader receives an Answer to Reset (ATR) from a smart card and transmits the ATR over a communication link to a computing device without waiting for an ATR request from the computing device. The computing device may cache the ATR and use it for subsequent communication sessions with the smart card. | 06-28-2012 |
20120208469 | ALERTING A SMART CARD READER OF PROBABLE WIRELESS COMMUNICATION - A wireless device may alert a wireless smart card reader that communication of data between the wireless device and the wireless smart card reader is probably imminent by sending an activation alert. Upon receipt of the activation alert, if the wireless smart card reader is in a low-power state, the wireless smart card reader may enter a higher-power state. If the wireless smart card reader is in the higher-power state upon receipt of the activation alert, the wireless smart card reader may remain in the higher-power state until a timeout period has expired. The wireless device may instruct the wireless smart card reader to enter the low-power state by sending a deactivation alert if the wireless device detects that communication of data between the wireless device and the wireless smart card reader is not likely to occur within a specified period of time. | 08-16-2012 |
20120210389 | AUTOMATIC SECURITY ACTION INVOCATION FOR MOBILE COMMUNICATIONS DEVICE - In one embodiment, there is provided a mobile communications device comprising: a processor; a communications subsystem operable to exchange signals with a wireless network; a storage element having application modules and data stored thereon, the data comprising at least user application data associated with the application modules and service data including data for establishing communications with the wireless network; and a security module operable to detect policy messages received by the device, and to perform a security action if a first policy message to enforce a first data protection policy is received and a subsequent policy message to enforce a second data protection policy is not received within a predetermined duration from the time at which the first policy message is received; wherein the security action comprises erasing or encrypting at least some of the data on the storage element. | 08-16-2012 |
20120297195 | ENABLING USE OF A CERTIFICATE STORED IN A SMART CARD - If a smart card is to be used for a particular purpose, and there is no certificate initialized on the smart card for this purpose, a computerized device enables a user to select one of the certificates already installed in the smart card for the particular purpose. The selected certificate may be imported into the computerized device. | 11-22-2012 |
20120322513 | INTERFACE AND COMMUNICATION PROTOCOL FOR A MOBILE DEVICE WITH A SMART BATTERY - Various embodiments are described herein for a mobile communication device that utilizes a smart battery. The mobile device includes a main processor for controlling the operation of the mobile communication device. The smart battery is coupled to the main processor and provides supply power. The smart battery includes a battery processor for controlling the operation of the smart battery and communicating with the main processor, and a battery module having one or more batteries for providing the supply power. A battery interface is provided for coupling between the main processor and the battery processor for providing communication therebetween. The battery interface comprises a data communication line and protection circuitry for protecting the main processor from electrostatic discharge. A communication protocol is also provided for communication between the main processor and the battery processor. | 12-20-2012 |
20120328094 | INTERFACE AND COMMUNICATION PROTOCOL FOR A MOBILE DEVICE WITH A SMART BATTERY - Various embodiments are described herein for a mobile communication device that utilizes a smart battery. The mobile device includes a main processor for controlling the operation of the mobile communication device. The smart battery is coupled to the main processor and provides supply power. The smart battery includes a battery processor for controlling the operation of the smart battery and communicating with the main processor, and a battery module having one or more batteries for providing the supply power. A battery interface is provided for coupling between the main processor and the battery processor for providing communication therebetween. The battery interface comprises a data communication line and protection circuitry for protecting the main processor from electrostatic discharge. A communication protocol is also provided for communication between the main processor and the battery processor. | 12-27-2012 |
20130045691 | ALERTING A SMART CARD READER OF PROBABLE WIRELESS COMMUNICATION - A wireless device may alert a wireless smart card reader that communication of data between the wireless device and the wireless smart card reader is probably imminent by sending an activation alert. Upon receipt of the activation alert, if the wireless smart card reader is in a low-power state, the wireless smart card reader may enter a higher-power state. If the wireless smart card reader is in the higher-power state upon receipt of the activation alert, the wireless smart card reader may remain in the higher-power state until a timeout period has expired. The wireless device may instruct the wireless smart card reader to enter the low-power state by sending a deactivation alert if the wireless device detects that communication of data between the wireless device and the wireless smart card reader is not likely to occur within a specified period of time. | 02-21-2013 |
20130064363 | INCORPORATING DATA INTO AN ECDSA SIGNATURE COMPONENT - During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature component. The particular information may be related to one or more of the signer and the message to be signed. After receiving a signed message purported to be signed by the signer, a verifier can extract the particular information from the signature component. | 03-14-2013 |
20130067218 | INCORPORATING DATA INTO CRYPTOGRAPHIC COMPONENTS OF AN ECQV CERTIFICATE - During generation of an implicit certificate for a requestor, a certificate authority incorporates information in the public-key reconstruction data, where the public-key reconstruction data is to be used to compute the public key of the requestor. The information may be related to one or more of the requestor, the certificate authority, and the implicit certificate. The certificate authority reversibly encodes the public-key reconstruction data in the implicit certificate and sends it to the requestor. After receiving the implicit certificate from the certificate authority, the requestor can extract the incorporated information from the public-key reconstruction data. The implicit certificate can be made available to a recipient, and the recipient can also extract the incorporated information. | 03-14-2013 |
20130305180 | Device And Method For Improving Efficiency Of Entering A Password Using A Key-Limited Keyboard - A method is provided for reducing a number of keys that a user is required to depress on a device having a keyboard with a limited number of keys when the user enters a password. The method comprising the following steps. A subset of characters used to define the password is determined. A filter to apply to the keyboard is determined in accordance with the determined subset of characters. The filter is applied when the user depresses the keys. Devices: and computer readable medium for implementing the method arc also provided. | 11-14-2013 |