Patent application number | Description | Published |
20080229389 | RESTRICTING ACCESS TO HARDWARE FOR WHICH A DRIVER IS INSTALLED ON A COMPUTER - Users of a computer are prevented from directly accessing certain hardware for which a driver is installed on the computer. The users are provided a limited, indirect manner to access the hardware for a specific purpose or to do a specific job. One example of such hardware is a wireless hardware communication interface. The wireless activity of the computer may be restricted so that the wireless hardware communication interface is prevented from communicating with any devices compatible with the wireless hardware communication interface other than one or more specific devices. | 09-18-2008 |
20080230609 | SMART CARD SESSION OPTIMIZATION - A method is provided for facilitating communications between a computer device and a smart card reader having an associated smart card. The computer device includes a smart card resource manager and a smart card reader service, the smart card reader service acting as a relay for commands between the smart card resource manager and the smart card reader. The method comprising the smart card reader service: (a) receiving from the smart card resource manager a first command for placing the smart card in a first state and relaying the first command to the smart card reader; (b) receiving a second command from the smart card resource manager for placing the smart card into a second state and a third command from the smart card resource manager for placing the smart card into the first state; and (c) determining if the smart card was in the first state prior to receiving the second command, and (i) if the smart card is determined to have been in the first state then forgoing relaying the second command and the third command to the smart card reader, and (ii) if the smart card is not determined to have been in the first state, then relaying the second command and the third command to the smart card reader. | 09-25-2008 |
20090001160 | SYSTEM AND METHOD FOR IMPROVING SMART CARD READER RECONNECTIONS - Communications between a computing device and a smart card reader configured for communication with a smart card are facilitated through the use, by the computing device, of a smart card resource manager and a smart card reader service. The smart card reader service acts as a relay for commands between the smart card resource manager and the smart card reader. Appropriate configuration of the smart card reader service obviates a redundant downloading of certificates from smart card to computing device subsequent to loss of a connection between the computing device and the smart card reader. However, upon re-establishing a previously lost connection to a smart card reader and determining that a communication link between a smart card and the smart card reader has been ended and reestablished during the loss of connection, the smart card reader service may indicate to the smart card resource manager that smart card is absent and, subsequently, that the smart card is present. | 01-01-2009 |
20090014519 | SMART CARD SET PROTOCOL OPTIMIZATION - A method of facilitating communications between a computer device and a smart card reader having an associated smart card, the computer device including a smart card resource manager and a smart card reader service, the smart card reader service acting as a relay for commands between the smart card resource manager and the smart card reader, the method comprising: receiving from the smart card resource manager a first command for setting a protocol for communications with the smart card; and responding, prior to receiving a reply from the smart card to the first command, to the smart card resource manager with a message indicating that the smart card has successfully received the first command. | 01-15-2009 |
20090188977 | OPTIMIZED SMART CARD DRIVER PERFORMANCE - By splitting a smart card driver into multiple components, with one component residing on the mobile communication device and another component residing on the smart card reader, the smart card reader driver component is enabled to do more than merely relay communication between the mobile communication device and the smart card. By transferring part of the communication handling of the smart card driver to the smart card reader, a reduction in communication over the connection between the smart card reader and mobile communication device advantageously results in a more efficient transaction. | 07-30-2009 |
20100133342 | SECURE USE OF EXTERNALLY STORED DATA - A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response APDU, wherein the filtered response APDU does not include the authentication data. Beneficially, when the smart card reader transmits the filtered response APDU toward a destination, the biometric template data is less susceptible to interception, thereby providing a more secure solution. | 06-03-2010 |
20100134274 | ANTICIPATORY RESPONSES TO COMMANDS - Responsive to intercepting an outbound command, a command interceptor may, upon determining that the command is associated with a particular category of commands, transmit an anticipatory response to the source of the command, for example, to prematurely indicate that the command has met with success. Accordingly, a given application whose further execution is dependent upon the successful completion of the command may further execute earlier than would be the case if the given application was to await the transmission of the command, the generation of a response indicating success and the receipt of the response indicating success. | 06-03-2010 |
20100138666 | SIMPLIFIED MULTI-FACTOR AUTHENTICATION - A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element. | 06-03-2010 |
20100138667 | AUTHENTICATION USING STORED BIOMETRIC DATA - A method is provided for storing a biometric template extracted a smart card for use on a user computing device. The biometric template is extracted from the smart card using a smart card reader. The biometric template is encrypted using a content protection key. The content protection key is encrypted using at least one of a device password or a smart card password. The password may be hashed. The encrypted biometric template, the encrypted content protection key and the hashed password may then be stored in a cache. A method for using the stored biometric template to access the user computer device is also provided. | 06-03-2010 |
20100205425 | MULTI-LEVEL DATA STORAGE - Rather than storing all data in the same manner, e.g., an encrypted manner, a security level with which to associate received data of a given type may be determined. Subsequently, distinct types of data may be stored in a distinct manner, with the manner of storage having a security level appropriate to the type of data. For example, a first type of data may be stored in an encrypted manner (i.e., with a high level of security), while a second level of data may be stored in a plain text manner (i.e., with a low level of security). | 08-12-2010 |
20100230492 | SMART CARD SESSION OPTIMIZATION - A method is provided for facilitating communications between a computer device and a smart card reader having an associated smart card. The computer device includes a smart card resource manager and a smart card reader service, the smart card reader service acting as a relay for commands between the smart card resource manager and the smart card reader. The method comprising the smart card reader service: (a) receiving from the smart card resource manager a first command for placing the smart card in a first state and relaying the first command to the smart card reader; (b) receiving a second command from the smart card resource manager for placing the smart card into a second state and a third command from the smart card resource manager for placing the smart card into the first state; and (c) determining if the smart card was in the first state prior to receiving the second command, and (i) if the smart card is determined to have been in the first state then forgoing relaying the second command and the third command to the smart card reader, and (ii) if the smart card is not determined to have been in the first state, then relaying the second command and the third command to the smart card reader. | 09-16-2010 |
20100250939 | SYSTEM AND METHOD OF HANDLING ENCRYPTED BACKUP DATA - By using a symmetric key to encrypt mobile device data before transmitting the data to a backup location in a backup operation, access to the data, at the backup location, may be restricted. To facilitate later decryption of the backed up mobile device data, the mobile device may also transmit the symmetric key to the off-device location. However, to limit use of the symmetric key, the mobile device may encrypt the symmetric key using authentication data, before transmitting the encrypted symmetric key to the backup location. | 09-30-2010 |
20100288839 | METHOD, SYSTEM AND SMART CARD READER FOR MANAGEMENT OF ACCESS TO A SMART CARD - The described embodiments relate generally to devices, methods and systems for managing access to a memory card, such as a smart card, by a plurality of accessing devices. Certain embodiments relate to a smart card reader (SCR) for managing access to a smart card by a plurality of accessing devices. The SCR comprises: a processor; a channel manager responsive to the processor for interfacing with the smart card; and a communication interface responsive to the channel manager for communicating with the plurality of accessing devices. | 11-18-2010 |
20120042018 | SYSTEM AND METHOD FOR MESSAGE DELIVERY - A method of receiving an email message using a communication network is presented. The method includes identifying an email message to be retrieved from a server. The email message is a multi-part message and includes content having two or more content types. The method includes determining a first content type to be retrieved from the server. The first content type includes non-plain-text content. The method includes retrieving content of the email message having the first content type from the server using the communication network, presenting the content having the first content type, and, after retrieving the content having the first content type from the server, retrieving content of the email message having a second content type from the server. The method includes verifying a digital signature associated with the email message. | 02-16-2012 |
20130103944 | Hypertext Link Verification In Encrypted E-Mail For Mobile Devices - A method, device and computer readable memory are provided for verifying hypertext links in an encrypted e-mail message to be sent to a mobile device to remove links that may contain malicious programs, link to a phishing website, or potentially comprise security of the mobile device or expose the user to unsafe sites or content. The hypertext links are extracted by decrypting the encrypted e-mail message. The hypertext links from the decrypted e-mail message are extracted and for each link the status is determined to verify the link. Actions can then be performed based upon the determined status of respective extracted hypertext links. | 04-25-2013 |
20130132732 | SIMPLIFIED MULTI-FACTOR AUTHENTICATION - A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element. | 05-23-2013 |
20140337636 | SIMPLIFIED MULTI-FACTOR AUTHENTICATION - A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element. | 11-13-2014 |