摘要:
A system and method for providing code signing services to software application developers or to other individuals or entities that wish to have applications digitally signed. Signing of the applications may be required in order to enable the applications to access sensitive APIs and associated resources of a computing device when the applications are executed on the computing device. In one embodiment, a method of providing code signing services will comprise at least some steps relating to registering the entities that seek access to sensitive APIs as controlled by the code signing authority, and managing the accounts of the registered entities.
摘要:
A wireless device (104,106) may alert a wireless smart card reader (102) that communication of data between the wireless device (104,106) and the wireless smart card reader (102) is probably imminent by sending an activation alert. Upon receipt of the activation alert, if the wireless smart card reader (102) is in a low-power state, the wireless smart card reader (102) may enter a higher-power state. If the wireless smart card reader (102) is in the higher-power state upon receipt of the activation alert, the wireless smart card reader (102) may remain in the higher-power state until a timeout period has expired. The wireless device (104,106) may instruct the wireless smart card reader (102) to enter the low-power state by sending a deactivation alert if the wireless device (104,106) identifies that communication of data between the wireless device (102,106) and the wireless smart card reader (102) is not likely to occur within a specified period of time.
摘要:
A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for authentication, a public key to the user input device such that the PIN or password entered by the user is encrypted before transmission to the smart card via a smart card reader. The smart card then decrypts the PIN or password to authorize the user. Preferably, the smart card is configured to provide both a public key and a nonce to the user input device, which then cncrypts a concatenation or other combination of the nonce and the user-input PIN or password before transmission to the smart card. The smart card reader thus never receives a copy of the PIN or password in the clear, allowing the smart card to be used with untrusted smart card readers.
摘要:
A system and method for the creation and automated selection and inclusion an automated signature text with an electronic message, wherein the automated selection of the automated signature text is dependent on attributes of the message, the designated recipients, or attributes of the designated recipients as compared to the sender's attributes, such as the encoding type and/or transport method selected for the electronic message or the location of the recipient without the need for multiple user profiles or manual editing by the sender. At least one of a plurality of automated signature texts is associated with at least one encoding type of a plurality of encoding types, at least one message transport type, or with at least one predeterined recipient attribute or the outcome of a comparison of the recipient attribute with the sender's attributes. The appropriate automated signature text is inserted prior to encoding of the message for transport.
摘要:
A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link.
摘要:
In a system with a policy server, a first device able to communicate with the policy server and a second device able to communicate with the first device and unable to communicate with the policy server, the first device is to act as a policy proxy. The policy server may communicate to the first device a policy for the second device, and the first device may communicate the policy to the second device.
摘要:
A first device (104) has a display (110) that is able to show information. The information is to be exchanged with a second device (102). The information is cleared from the display (110) following receipt of an indication from the second device (102) that the information has been successfully inputted at the second device (102).
摘要:
A mobile communications device for communicating with a wireless network. The device includes a processor, a communications sub-system connected to the processor for exchanging signals with the wireless network and with the processor, a user input device connected to the processor for sending user input signals to the processor in response to user inputs. A security module is associated with the processor for automatically taking a security action upon detecting a predetermined security user input through the user input device. The security action can include sending a duress message and/or wiping data stored on the device.