摘要:
A wireless personal area network (WPAN) system includes a plurality of WPAN devices using encrypted wireless communication therebetween when in an enabled state and not wirelessly communicating when in a disabled state. At least one of the WPAN devices includes a WPAN identity reader for reading at least one identifying parameter of a user, for confirming that the user is an authorized user based upon reading the at least one identifying parameter, and for wirelessly communicating with at least one other WPAN device to switch the at least one other WPAN device from the disabled state to the enabled state based upon confirming the user is an authorized user.
摘要:
A method and system for monitoring the health of a wireless telecommunication network. Network health is monitored without placing an administrative burden on the carrier network itself; instead, this burden is placed on components that lie outside the carrier network and pass communications through it. The data service provider infrastructure sends a request to a mobile device, asking that it return data regarding its location. The carrier networks handling the request insert location information into the packet that is sent to the mobile device, but this information is not sent to the data service provider infrastructure itself. The mobile device harvests this location information from the packets it receives and inserts it in a response packet that finds its way back to the data service provider infrastructure. The data service provider infrastructure is able to collate this location data and to analyze it, determining the carrier network's health.
摘要:
A communication system is provided with program logic for enforcing an IT Policy specifying suitable encryption encoding levels for corresponding security classification levels (and/or encryption strengths).
摘要:
A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link.
摘要:
A portable wireless user communication device is wirelessly coupled to a second device over a monitored link. If the link is lost or endangered, then a user alarm is activated at the portable wireless user device and/or at the second device to which it is linked (which may also be a portable electronic device). The type of monitoring and/or the type of alarming may be user selectable.
摘要:
A mobile wireless communication device is provided with an integral transducer used to refresh a random data pool without connection to an external source of new random data.
摘要:
During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature component. The particular information may be related to one or more of the signer and the message to be signed. After receiving a signed message purported to be signed by the signer, a verifier can extract the particular information from the signature component.
摘要:
A smart card reader receives an Answer to Reset (ATR) from a smart card and transmits the ATR over a communication link to a computing device without waiting for an ATR request from the computing device. The computing device may cache the ATR and use it for subsequent communication sessions with the smart card.
摘要:
Various embodiments are described for providing password approval on a device. The password approval includes getting the user password, generating at least one symbolically equivalent password and then comparing the at least one symbolically equivalent password with at least one specified forbidden password. The user password is disapproved if one of the symbolically equivalent passwords corresponds to the at least one forbidden password.
摘要:
A certificate from a smart card is imported into a computerized device via a smart card reader. The computerized device calculates a hash of the imported certificate and stores the hash in memory. The hash may be stored in a region of the memory that is unaffected by upgrades to the device.