摘要:
An apparatus and method for integrating authentication protocols in the establishment of connections between a controlled-access first computing device and at least one second computing device. In one embodiment, network access user authentication data needed to access the at least one second computing device is transmitted to an authentication server automatically if the user has access to use the first computing device, thereby not requiring the user to manually enter the authentication data needed for such access at the first computing device. The network access user authentication data may be, for example, retrieved from a memory store of the first computing device and/or generated in accordance with an authentication data generating algorithm.
摘要:
An electronic communication device includes a buffer and a controller. The buffer stores characters as they are being input by a user. The controller transmits the stored characters over a network when a pause in the input of characters exceeds a threshold time period. The controller also dynamically adjusts the threshold time period.
摘要:
A system and method of distributing authentication information for remotely accessing a computer resource. A request for authentication information, including identity information, is received from a user of a remote device. When the user is authenticated based on the identity information, requested authentication information is retrieved and returned to the remote device. The authentication information, or information generated from the authentication information, is then used for remotely accessing the computer resource.
摘要:
Protection of real-time data such as voice data exchanged as packets between a mobile electronic device (10) and a VPN gateway (122) during a media session over a communications link (130) that includes a wireless network (132). A first VPN connection (136) is established between the mobile electronic device (10) and the VPN gateway (122) through the communications link (130), the first VPN connection (136) using key-based encryption to protect data exchanged therethrough. While the first VPN connection (136) is established, a second VPN connection (138) is established between the mobile electronic device (10) and the VPN gateway (122) through the communications link (130), the second VPN connection (138) using key-based encryption to protect data exchanged therethrough. Real-time data packets are exchanged between the mobile electronic device (10) and the VPN gateway (122) through the second VPN connection (138).
摘要:
An apparatus and method for integrating authentication protocols in the establishment of connections between a controlled-access first computing device and at least one second computing device. In one embodiment of the invention, network access user authentication data needed to access the at least one second computing device is transmitted to an authentication server automatically if the user has access to use the first computing device, thereby not requiring the user to manually enter the authentication data needed for such access at the first computing device. The network access user authentication data may be, for example, retrieved from a memory store of the first computing device and/or generated in accordance with an authentication data generating algorithm.
摘要:
A system and method for managing informational objects on a mobile device. A user-selectable option is displayed to a user of the mobile device. The option is associated with an action to be performed on informational objects sharing at least one specified characteristic (e.g., storing all e-mail messages that are part of the same thread in a folder, generating a distribution list of contacts belonging to a specified group). After the user has selected the option, the application identifies informational objects having the at least one specified characteristic and performs the action on the identified objects.
摘要:
An apparatus and method for integrating authentication protocols in the establishment of connections between a controlled-access first computing device and at least one second computing device. In one embodiment, network access user authentication data needed to access the at least one second computing device is transmitted to an authentication server automatically if the user has access to use the first computing device, thereby not requiring the user to manually enter the authentication data needed for such access at the first computing device. The network access user authentication data may be, for example, retrieved from a memory store of the first computing device and/or generated in accordance with an authentication data generating algorithm.
摘要:
An electronic communication device includes a buffer and a controller. The buffer stores characters as they are being input by a user. The controller transmits the stored characters over a network when the number of characters stored exceeds a threshold. The controller also dynamically adjusts the threshold time period.
摘要:
An electronic communication device includes a buffer and a controller. The buffer stores characters as they are being input by a user. The controller transmits the stored characters over a network when the number of characters stored exceeds a threshold. The controller also dynamically adjusts the threshold time period.
摘要:
Systems and methods for handling messages on a mobile device. A system and method could be configured to receive at a mobile device a message that is associated with a message expiry indicator. If a message expiry indicator is determined to be associated with the received message, then the received message is removed from the mobile device.