Patent application number | Description | Published |
20090011747 | File Sharing with a Hostile System - A mobile device is provided. The mobile device comprises a storage device storing one or more files and a serial port for connecting the mobile device to a remote system. The mobile device further comprises a user interface allowing a user of the mobile device to select a file stored on the storage device such that when the mobile device is connected to the remote system via the serial port, the remote system can only access the selected file. | 01-08-2009 |
20090186630 | ADJUSTING USER SETTINGS ON A HANDHELD MOBILE COMMUNICATION DEVICE BASED UPON LOCATION - A handheld electronic device that receives geo-location based signal data into a microprocessor on board the handheld electronic device. The microprocessor processes the signal data into location data representative of the present geographic location of the electronic handheld device. The microprocessor adjusts at least one user defined setting of the handheld electronic device based on whether the location data indicates that the handheld electronic device is within stored geographical boundaries. | 07-23-2009 |
20090186672 | SYSTEMS AND METHODS FOR MAINTAINING DATA INTEGRITY OF STORAGE MEDIA OF AN ELECTRONIC DEVICE - The described embodiments relate generally to methods, systems and devices for maintaining data integrity of storage media of a handheld electronic device, particularly when such device may be dropped, for example, i.e. subject to some unintended motion, which may cause the power supply to the storage media to be interrupted or terminated. | 07-23-2009 |
20100058053 | SYSTEM, METHOD AND SECURITY DEVICE FOR AUTHORIZING USE OF A SOFTWARE TOOL - The described embodiments relate generally to methods, systems and security devices for authorizing use of a software tool. Certain embodiments of the invention relate to a security device. The security device comprises at least one communication subsystem for enabling communication between the security device and a first external device, wherein the first external device has a software tool executable on the first external device. The security device further comprises a memory and processor coupled to the at least one communication subsystem and configured to control the at least one communication subsystem. The memory is accessible to the processor and stores a key for authorizing use of the software tool. The memory further stores program instructions which, when executed by the processor, cause the processor to execute a security application. | 03-04-2010 |
20100169512 | Method and Apparatus for Enabling Enhanced USB Interaction - Systems and methods for configuring a universal serial bus (USB) including for connection by a peripheral device by detecting an attach event at a USB port on the peripheral device; receiving, at the USB port, a first request for device identification; sending, at the USB port, a first identification data; receiving, at the USB port, a query related to the first identification data, the query indicating software associated with the vendor identifier is supported by the sender of the query; simulating a detach and then an attach at the USB port; receiving, at the USB port, a second request for device identification; and sending, at the USB port, a second identification data that includes an indication that the peripheral device supports at least one function from a plurality of functions that are different from the functionality defined by a generic device class code. | 07-01-2010 |
20120008766 | SECURING A COMPONENT PRIOR TO MANUFACTURE OF A DEVICE - By securing a component within a product, before the component is delivered to the final device manufacturing facility, the device manufacturing process can be made provably secure. Additionally, the component may be tested for security and authenticity during manufacture and even later, as the device enters use by a consumer. | 01-12-2012 |
20120011285 | Method and Apparatus for Enabling Enhanced USB Interaction - Systems and methods for configuring a universal serial bus (USB) including for connection by a peripheral device by detecting an attach event at a USB port on the peripheral device; receiving, at the USB port, a first request for device identification; sending, at the USB port, a first identification data; receiving, at the USB port, a query related to the first identification data, the query indicating software associated with the vendor identifier is supported by the sender of the query; simulating a detach and then an attach at the USB port; receiving, at the USB port, a second request for device identification; and sending, at the USB port, a second identification data that includes an indication that the peripheral device supports at least one function from a plurality of functions that are different from the functionality defined by a generic device class code. | 01-12-2012 |
20130042037 | Method and Apparatus for Enabling Enhanced USB Interaction - Methods and apparatuses for configuring a universal serial bus (USB) connection. The method comprises receiving, at a USB port, first identification data that includes a generic device class code and a vendor identifier. Receiving the first identification causes one of enabling interaction with a peripheral device in accordance with functionality specified by the generic device class code if the host device does not support software associated with the vendor identifier, or sending, at the USB port, a query to the peripheral device if the host device does support software associated with the vendor identifier, the query sent to determine whether the peripheral device supports at least one function different from the functionality specified by the generic device class code. | 02-14-2013 |
20140082367 | VERIFYING PASSWORDS ON A MOBILE DEVICE - Methods, systems, and computer programs for verifying a password are disclosed. For example, the password can be verified on a mobile device to control user access to the mobile device. In some implementations, a mobile device includes a user interface, a main processor, and a co-processor. The user interface receives a submitted password value from a user. The main processor calls the co-processor to provide a hash chain input value based on the submitted password value. The main processor evaluates a hash chain based on the hash chain input value provided by the co-processor. Evaluating the hash chain generates a submitted password verification value. The submitted password verification value is compared to a stored password verification value stored on the mobile device. Access to mobile device functionality may be permitted or denied based on a result of the comparison. | 03-20-2014 |