Patent application number | Description | Published |
20080214111 | LOST PHONE ALARM SYSTEM AND METHOD - A system and method having an alarm software module recorded on a computer-readable medium programmed to monitor a connection between an accoutrement and a mobile phone. The alarm software module instructs an alarm to be issued if a threshold is met. In addition, the module may instruct the phone to lock. | 09-04-2008 |
20090265552 | SYSTEMS AND METHODS FOR SECURE SHORT MESSAGING SERVICE AND MULTIMEDIA MESSAGING SERVICE - Systems and methods for managing (for example, creating, transmitting, delivering, encrypting, storing, and the like) secure SMS (short message service) and secure MMS (multimedia messaging service) communications are disclosed. | 10-22-2009 |
20110145564 | SYSTEMS AND METHODS FOR SECURE SHORT MESSAGING SERVICE AND MULTIMEDIA MESSAGING SERVICE - Systems and methods for managing (for example, creating, transmitting, delivering, encrypting, storing, and the like) secure SMS (short message service) and secure MMS (multimedia messaging service) communications are disclosed. | 06-16-2011 |
20110151903 | SECURE MOBILE INFORMATION MANAGEMENT SYSTEM AND METHOD - Information or items that otherwise might be carried in a person's wallet or purse may be managed and stored on a mobile phone. Embodiments include a software application loaded on a mobile phone and an Internet website through which certain information can be transmitted to the phone by the user, third parties, or both. A user may be alerted to certain information or changes in information that meet certain criteria. The website may provide secure storage for information, filter information, and send encrypted and compressed nuggets or fractions of information to the phone for storage based on topic. E-mails may be searched for information, information may be sent to different parties, and signals may be sent locally to exchange information. Personal information may include account information or travel information, for example. | 06-23-2011 |
20120270560 | METHODS TO AUTHENTICATE ACCESS AND ALARM AS TO PROXIMITY TO LOCATION - Methods for authenticating access and providing positional awareness using mobile phones. Embodiments for authenticating access include receiving identification indicia from a person seeking access, sending a message to a person having authority for access, and receiving either a second message indicating that the person has taken an affirmative action to indicate authorization, or a password that was provided in the first message. Access may be computer access or physical access, as examples. Methods of providing positional awareness include obtaining or storing location coordinates, monitoring the location of a mobile phone, and providing an alarm, for example, through a second mobile phone. In a number of embodiments, location coordinates are automatically obtained from Internet websites. In some embodiments, parents can monitor the location of their children to make sure they do not get too close to a reported residence of a registered sex offender, for instance. | 10-25-2012 |
20140214610 | Method and System to Intelligently Assess and Mitigate Security Risks on a Mobile Device - A method and system is provided for evaluating an application manufacturer's credibility to produce or maintain a mobile device application. The method includes gathering information about an application manufacturer, wherein the information includes at least one of: (i) publicly available information about the manufacture; (ii) private information provided by the manufacturer; and (iii) source code information for the application developed by the manufacturer. With the computer system, the gathered information is stored in a manufacturer profile, which includes a plurality of attributes of the manufacturer. The computer system uses the manufacturer profile to calculate a score for the manufacturer, which is then used to calculate an application risk score associated with applications produced or maintained by the manufacturer. The risk score reflects, at least in part, the credibility of the manufacturer to produce or maintain the mobile device application. | 07-31-2014 |
20150072654 | Systems And Methods For Encrypted Mobile Voice Communications - A system for establishing a registration for secure communication between a mobile device and a server includes a server configured to: determine the phone number of the mobile device from which the SMS or MMS message is originated; and verify the phone number of the mobile device originating the SMS or MMS message against a whitelist to authorize a registration between the mobile device and the server. The server can establish an encryption key between the mobile device and the server, which can used to provide or enhance encryption of a voice communication, such as a VoIP communication, made using the mobile device. The server can renew the encryption key based on one or more policies determined by an administrator. The server can be configured to verify a secure identification code that is input at the mobile device and which can be provided to a user of the mobile device before the mobile device is registered with the server. | 03-12-2015 |
Patent application number | Description | Published |
20080214111 | LOST PHONE ALARM SYSTEM AND METHOD - A system and method having an alarm software module recorded on a computer-readable medium programmed to monitor a connection between an accoutrement and a mobile phone. The alarm software module instructs an alarm to be issued if a threshold is met. In addition, the module may instruct the phone to lock. | 09-04-2008 |
20110029966 | NON-INVASIVE AUTOMATIC OFFSITE PATCH FINGERPRINTING AND UPDATING SYSTEM AND METHOD - Methods, systems, and configured storage media are provided for discovering software updates, discovering if a given computer can use the software update, and then updating the computers with the software as needed automatically across a network without storing the updates on an intermediate machine within the network. Furthermore, when a failure is detected, the rollout is stopped and the software can be automatically removed from those computers that already were updated. The software update can be stored originally at an address that is inaccessible through the network firewall by intermediately uploading the software update to an update computer which is not a part of the network but has access through the firewall, which is then used to distribute the update. | 02-03-2011 |
20110151903 | SECURE MOBILE INFORMATION MANAGEMENT SYSTEM AND METHOD - Information or items that otherwise might be carried in a person's wallet or purse may be managed and stored on a mobile phone. Embodiments include a software application loaded on a mobile phone and an Internet website through which certain information can be transmitted to the phone by the user, third parties, or both. A user may be alerted to certain information or changes in information that meet certain criteria. The website may provide secure storage for information, filter information, and send encrypted and compressed nuggets or fractions of information to the phone for storage based on topic. E-mails may be searched for information, information may be sent to different parties, and signals may be sent locally to exchange information. Personal information may include account information or travel information, for example. | 06-23-2011 |
20130252585 | SYSTEMS AND METHODS FOR ENCRYPTED MOBILE VOICE COMMUNICATIONS - A method of establishing a registration between a mobile device and a server includes receiving at the server an SMS or MMS from a mobile device. The server receives the phone number of the mobile device, verifies the phone number of the mobile device against a whitelist to authorize a registration between the mobile device and the server, and verifies a secure identification code that is input at the mobile device. The secure identification code is provided to a user of the mobile phone before the mobile device is registered with the server. The secure identification code can be provided to the user via an administrator of the server. An encryption key established between the mobile device and the server can be used to provide or enhance encryption of a voice communication, such as a VoIP communication, made using the mobile device. | 09-26-2013 |
20140214610 | Method and System to Intelligently Assess and Mitigate Security Risks on a Mobile Device - A method and system is provided for evaluating an application manufacturer's credibility to produce or maintain a mobile device application. The method includes gathering information about an application manufacturer, wherein the information includes at least one of: (i) publicly available information about the manufacture; (ii) private information provided by the manufacturer; and (iii) source code information for the application developed by the manufacturer. With the computer system, the gathered information is stored in a manufacturer profile, which includes a plurality of attributes of the manufacturer. The computer system uses the manufacturer profile to calculate a score for the manufacturer, which is then used to calculate an application risk score associated with applications produced or maintained by the manufacturer. The risk score reflects, at least in part, the credibility of the manufacturer to produce or maintain the mobile device application. | 07-31-2014 |
20150072654 | Systems And Methods For Encrypted Mobile Voice Communications - A system for establishing a registration for secure communication between a mobile device and a server includes a server configured to: determine the phone number of the mobile device from which the SMS or MMS message is originated; and verify the phone number of the mobile device originating the SMS or MMS message against a whitelist to authorize a registration between the mobile device and the server. The server can establish an encryption key between the mobile device and the server, which can used to provide or enhance encryption of a voice communication, such as a VoIP communication, made using the mobile device. The server can renew the encryption key based on one or more policies determined by an administrator. The server can be configured to verify a secure identification code that is input at the mobile device and which can be provided to a user of the mobile device before the mobile device is registered with the server. | 03-12-2015 |