Abstract:
The present invention provides a method for forwarding calls placed to a primary destination comprising receiving at least one call forwarding profiles, each call forwarding profile having a predefined duration and at least one call forwarding destination, receiving an instruction to activate one call forwarding profile to an activated profile and forwarding calls placed to the telecommunications destination according to the activated profile.
Abstract:
Interacting digitally communicating devices cooperate to schedule future meetings include a capability to handle conditional acceptance of meeting requests. For example, a conditional acceptance may be subject to Boolean logic functions of the acceptance status(es) of other meeting invitees (e.g., the condition that another specific one or more invitees also accept the meeting request).
Abstract:
A system and method for managing memory in a mobile device to prevent the swapping out of sensitive data to non-volatile storage from a volatile memory, to provide enhanced security for the sensitive data. In one broad aspect, there is provided a method of managing memory in a mobile device comprising the steps of identifying one or more data objects stored in a volatile memory on the mobile device to be swapped out to a non-volatile storage component, determining objects marked as containing sensitive data, and retaining so-marked objects in the volatile memory of the mobile device.
Abstract:
A system includes a wireless-enabled smart card reader able to be connected concurrently to at least two devices and a mobile device able to be connected wirelessly to the smart card reader and to control connections of the smart card reader.
Abstract:
The present invention provides a method for notifying at least one invitee of an initial event of changes to the initial event. The method comprises receiving the initial event comprising a plurality of initial event elements and receiving an updated event comprising a plurality of updated event elements, each updated event element corresponding to a respective initial event element. The updated event elements are compared to the initial event elements to determine which of the updated event elements are changed event elements that differ from their respective initial event elements and the at least one invitee is notified of any specific changed event elements.
Abstract:
A method of facilitating the initiation of an outgoing phone call on a handheld electronic device including receiving a request to initiate the outgoing phone call and determining whether additional user action is required in order to initiate the outgoing phone call. If it is determined that additional user action is required, the method further includes: (i) displaying a prompt on the handheld electronic device that indicates that the additional user action must be taken in order to initiate the outgoing phone call, and (ii) providing an alert, such as an audible signal, that is separate from the prompt. Also, a handheld electronic device including a display, a processor, and a memory in electronic communication with the processor. The memory stores one or more routines executable by the processor for implementing the described method.
Abstract:
A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one broad aspect, a method is provided in which a certificate search request is received, a search of one or more certificate servers for certificates satisfying the request is performed, located certificates are retrieved and processed at a first computing device to determine data that uniquely identifies each located certificate, and search result data comprising the determined data is communicated to a second device (e.g. a mobile device) for use in determining whether each located certificate is already stored on the second device.
Abstract:
A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, a certificate synchronization application is programmed to perform certificate searches by querying one or more certificate servers using contact information stored on a computing device, from an address book for example. The invention allows certificates for contacts to be automatically searched for and retrieved from certificate servers, so that users need not manually search for certificates associated with each individual contact for which information is stored in a contact information source.
Abstract:
A circuit board tester that uses a dual-stage translation to bring a unit under test (UUT) into physical and electric contact first with a series of tall probes, then with a series of short probes. Initially, the UUT is mounted on a support plate, and spaced apart from both the tall and short probes. First, in order to perform a functional test on the UUT, a first vacuum stage is engaged, and atmospheric pressure translates the UUT longitudinally until contact is made with a first hard stop, defining a first position. At this first position, the UUT is in contact with a series of tall probes, and is spaced apart from a series of short probes. After a function test is performed, a second vacuum stage is engaged in addition to, and independent of, the first vacuum stage. Atmospheric pressure translates the UUT longitudinally until contact is made with a second hard stop, defining a second position. At this second position, the UUT is in contact with both tall and short probes (the tall probes being appropriately spring-loaded so as to maintain physical and electric contact with the UUT without damaging the UUT). After an in-circuit test is performed, both vacuum stages are released, and the UUT returns to its initial location, spaced apart from both the tall and short probes. The UUT may be replaced with another part to be tested, and the cycle is repeated.
Abstract:
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to enter into a protected mode. Data associated with fields displayed on a user interface are stored in a secure form on the mobile device. After the mobile device leaves the protected mode, the stored user interface field data is accessed and used to populate one or more user interface fields with the accessed user interface field data for display to a user.