Patent application number | Description | Published |
20090036125 | SYSTEM AND METHOD FOR REGISTRATION FOR APPLICATION PROGRAM DEPLOYMENT - A communication system includes a development sector for registering a plurality of wireless devices, a business sector for controlling utilization of an application program and for receiving application data, a service sector for deploying the application program and for providing the application data to the business sector in accordance with communication with at least one wireless device of the plurality; and a mobile sector comprising the plurality of wireless devices, each device for receiving the application program deployed by the service sector, executing the application program in response to the business sector, and communicating with the service sector to support provision of the application data to the business sector. The wireless device, such as a cell phone, personal digital assistant, or palm top computer may include an auxiliary device such as a bar code scanner, a magnetic stripe card reader, or a printer. The business sector or service sector may monitor or limit utilization of the auxiliary device. Deployment of application programs may be controlled by the business sector or the development sector by rendering an application program or auxiliary device available for use only after a particular time or after receipt of a message. Distributed processing application programs having components in the business, service, and mobile sectors may thereby be updated in an orderly manner. An application program on a wireless device may assist confirmation of an order made by a buyer via a web site. The wireless device is expected to be operated by the buyer. Fraud reporting is accomplished by comparing data obtained by registration of the wireless device with data provided in the confirmation. | 02-05-2009 |
20090037329 | SYSTEM AND METHOD FOR DEPLOYING APPLICATION PROGRAMS - A communication system includes a development sector for registering a plurality of wireless devices, a business sector for controlling utilization of an application program and for receiving application data, a service sector for deploying the application program and for providing the application data to the business sector in accordance with communication with at least one wireless device of the plurality; and a mobile sector comprising the plurality of wireless devices, each device for receiving the application program deployed by the service sector, executing the application program in response to the business sector, and communicating with the service sector to support provision of the application data to the business sector. The wireless device, such as a cell phone, personal digital assistant, or palm top computer may include an auxiliary device such as a bar code scanner, a magnetic stripe card reader, or a printer. The business sector or service sector may monitor or limit utilization of the auxiliary device. Deployment of application programs may be controlled by the business sector or the development sector by rendering an application program or auxiliary device available for use only after a particular time or after receipt of a message. Distributed processing application programs having components in the business, service, and mobile sectors may thereby be updated in an orderly manner. An application program on a wireless device may assist confirmation of an order made by a buyer via a web site. The wireless device is expected to be operated by the buyer. Fraud reporting is accomplished by comparing data obtained by registration of the wireless device with data provided in the confirmation. | 02-05-2009 |
20090037330 | SYSTEM AND METHOD FOR DEPLOYING APPLICATION PROGRAM COMPONENTS - A communication system includes a development sector for registering a plurality of wireless devices, a business sector for controlling utilization of an application program and for receiving application data, a service sector for deploying the application program and for providing the application data to the business sector in accordance with communication with at least one wireless device of the plurality; and a mobile sector comprising the plurality of wireless devices, each device for receiving the application program deployed by the service sector, executing the application program in response to the business sector, and communicating with the service sector to support provision of the application data to the business sector. The wireless device, such as a cell phone, personal digital assistant, or palm top computer may include an auxiliary device such as a bar code scanner, a magnetic stripe card reader, or a printer. The business sector or service sector may monitor or limit utilization of the auxiliary device. Deployment of application programs may be controlled by the business sector or the development sector by rendering an application program or auxiliary device available for use only after a particular time or after receipt of a message. Distributed processing application programs having components in the business, service, and mobile sectors may thereby be updated in an orderly manner. An application program on a wireless device may assist confirmation of an order made by a buyer via a web site. The wireless device is expected to be operated by the buyer. Fraud reporting is accomplished by comparing data obtained by registration of the wireless device with data provided in the confirmation. | 02-05-2009 |
20090042552 | SYSTEM AND METHOD FOR DEPLOYING APPLICATION PROGRAMS - A communication system includes a development sector for registering a plurality of wireless devices, a business sector for controlling utilization of an application program and for receiving application data, a service sector for deploying the application program and for providing the application data to the business sector in accordance with communication with at least one wireless device of the plurality; and a mobile sector comprising the plurality of wireless devices, each device for receiving the application program deployed by the service sector, executing the application program in response to the business sector, and communicating with the service sector to support provision of the application data to the business sector. The wireless device, such as a cell phone, personal digital assistant, or palm top computer may include an auxiliary device such as a bar code scanner, a magnetic stripe card reader, or a printer. The business sector or service sector may monitor or limit utilization of the auxiliary device. Deployment of application programs may be controlled by the business sector or the development sector by rendering an application program or auxiliary device available for use only after a particular time or after receipt of a message. Distributed processing application programs having components in the business, service, and mobile sectors may thereby be updated in an orderly manner. An application program on a wireless device may assist confirmation of an order made by a buyer via a web site. The wireless device is expected to be operated by the buyer. Fraud reporting is accomplished by comparing data obtained by registration of the wireless device with data provided in the confirmation. | 02-12-2009 |
20090043700 | SYSTEM AND METHOD FOR DEPLOYING APPLICATION PROGRAM COMPONENTS HAVING A SERVICE SECTOR - A communication system includes a development sector for registering a plurality of wireless devices, a business sector for controlling utilization of an application program and for receiving application data, a service sector for deploying the application program and for providing the application data to the business sector in accordance with communication with at least one wireless device of the plurality; and a mobile sector comprising the plurality of wireless devices, each device for receiving the application program deployed by the service sector, executing the application program in response to the business sector, and communicating with the service sector to support provision of the application data to the business sector. The wireless device, such as a cell phone, personal digital assistant, or palm top computer may include an auxiliary device such as a bar code scanner, a magnetic stripe card reader, or a printer. The business sector or service sector may monitor or limit utilization of the auxiliary device. Deployment of application programs may be controlled by the business sector or the development sector by rendering an application program or auxiliary device available for use only after a particular time or after receipt of a message. Distributed processing application programs having components in the business, service, and mobile sectors may thereby be updated in an orderly manner. An application program on a wireless device may assist confirmation of an order made by a buyer via a web site. The wireless device is expected to be operated by the buyer. Fraud reporting is accomplished by comparing data obtained by registration of the wireless device with data provided in the confirmation. | 02-12-2009 |
20120266132 | SYSTEM AND METHOD FOR DEVELOPING AN APPLICATION PROGRAM FOR WIRELESS DEVICES - A communication system includes a development sector for registering a plurality of wireless devices, a business sector for controlling utilization of an application program and for receiving application data, a service sector for deploying the application program and for providing the application data to the business sector in accordance with communication with at least one wireless device of the plurality; and a mobile sector comprising the plurality of wireless devices, each device for receiving the application program deployed by the service sector, executing the application program in response to the business sector, and communicating with the service sector to support provision of the application data to the business sector. The wireless device, such as a cell phone, personal digital assistant, or palm top computer may include an auxiliary device such as a bar code scanner, a magnetic stripe card reader, or a printer. | 10-18-2012 |
20130137430 | SYSTEM AND METHOD FOR REGISTRATION FOR APPLICATION PROGRAM DEPLOYMENT - A communication system includes a development sector for registering a plurality of wireless devices, a business sector for controlling utilization of an application program and for receiving application data, a service sector for deploying the application program and for providing the application data to the business sector in accordance with communication with at least one wireless device of the plurality; and a mobile sector comprising the plurality of wireless devices, each device for receiving the application program deployed by the service sector, executing the application program in response to the business sector, and communicating with the service sector to support provision of the application data to the business sector. Deployment of application programs may be controlled by the business sector or the development sector by rendering an application program or auxiliary device available for use only after a particular time or after receipt of a message. | 05-30-2013 |
Patent application number | Description | Published |
20150117636 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE - In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in an entropy data cache. An entropy pool is monitored to determine a level of entropy data available and, based on the level determined, entropy data is provided from the entropy data cache to the entropy pool. Entropy data from the entropy pool is then applied to perform a cryptographic operation such as the generation of an encryption key for encrypting communications sent or received by the mobile communication device. | 04-30-2015 |
20150117637 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE SELECTING DATA FROM MULTIPLE SENSORS - In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in an entropy data cache. An entropy pool is monitored to determine a level of entropy data available and, based on the level determined, entropy data is provided from the entropy data cache to the entropy pool. Entropy data from the entropy pool is then applied to perform a cryptographic operation such as the generation of an encryption key for encrypting communications sent or received by the mobile communication device. | 04-30-2015 |
20150117638 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE BASED ON A CONTEXTUAL VARIABLE - In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets Which are combined to produce entropy data which is stored in an entropy data cache. An entropy pool is monitored to determine a level of entropy data available and, based on the level determined, entropy data is provided from the entropy data cache to the entropy pool. Entropy data from the entropy pool is then applied to perform a cryptographic operation such as the generation of an encryption key for encrypting communications sent or received by the mobile communication device. | 04-30-2015 |
20150117642 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE USING AN ENTROPY POOL - In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in an entropy data cache. An entropy pool is monitored to determine a level of entropy data available and, based on the level determined, entropy data is provided from the entropy data cache to the entropy pool. Entropy data from the entropy pool is then applied to perform a cryptographic operation such as the generation of an encryption key for encrypting communications sent or received by the mobile communication device. | 04-30-2015 |
20150117643 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE COMBINING DATA FROM MULTIPLE SENSORS - In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in an entropy data cache. An entropy pool is monitored to determine a level of entropy data available and, based on the level determined, entropy data is provided from the entropy data cache to the entropy pool. Entropy data from the entropy pool is then applied to perform a cryptographic operation such as the generation of an encryption key for encrypting communications sent or received by the mobile communication device. | 04-30-2015 |
20150117644 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE BASED ON A USER ACTION - In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in an entropy data cache. An entropy pool is monitored to determine a level of entropy data available and, based on the level determined, entropy data is provided from the entropy data cache to the entropy pool. Entropy data from the entropy pool is then applied to perform a cryptographic operation such as the generation of an encryption key for encrypting communications sent or received by the mobile communication device. | 04-30-2015 |
20150117646 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE INCLUDING AN ENTROPY FILTER - In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in an entropy data cache. An entropy pool is monitored to determine a level of entropy data available and, based on the level determined, entropy data is provided from the entropy data cache to the entropy pool. Entropy data from the entropy pool is then applied to perform a cryptographic operation such as the generation of an encryption key for encrypting communications sent or received by the mobile communication device. | 04-30-2015 |