摘要:
A method for responding to an electronic mail (“email”) message presented to a user on a display screen of a data processing system, comprising: receiving a command from the user to generate a reply to the email message using content from one or more template replies, the reply having a subject line and a body; presenting a choice of the one or more template replies to the user; receiving a command to select a template reply from the choice, the template reply having a subject line and a body; and generating the reply by inserting content from the body of the template reply into the body of the reply.
摘要:
A method of ambiguous word review or correction for a handheld electronic device includes receiving a plurality of actuations of input members in which each of a number of these members has a plurality of assigned characters, rendering a plurality of words responsive to the actuations, displaying a plurality of representations of the words, and detecting a number of the words, which are ambiguous. For each of the detected number, a visual indicator is displayed associated with a corresponding one of the representations. Touching of a touch screen is detected in connection with the displayed visual indicator. Preferably, a first magnification of the corresponding representation and a second magnification of a representation of a number of alternative words are displayed. The touch screen can be used to select one of the first and second magnifications to correct the ambiguous word.
摘要:
A method and apparatus for generating a notification at a computing device is provided, the computing device having an output module. A meeting request having a requested time period is received. An attribute is determined based on the requested time period and on a calendar database comprising calendared events. The output module is caused to generate a notification if the attribute meets or exceeds a predetermined threshold.
摘要:
A mobile device adjusts its scanning parameters, depending on the rate of change of location of the mobile device. Examples of scanning parameters that may be adjusted include a back-off parameter that affects the time between successive scans, and a scan/don't scan parameter that according to its value prevents the mobile device from scanning or permits the mobile device to scan. The mobile device may maintain different back-off parameters for different types of scans. Determining which scanning parameters to adjust and how to adjust them may depend on whether the rate of change of location of the mobile device does not exceed a low threshold, exceeds a high threshold, or exceeds the low threshold and does not exceed the high threshold. Different thresholds may be applied by the mobile device for different types of scans.
摘要:
A method is provided for reducing a number of keys that a user is required to depress on a device having a keyboard with a limited number of keys when the user enters a password. The method comprising the following steps. A subset of characters used to define the password is determined. A filter to apply to the keyboard is determined in accordance with the determined subset of characters. The filter is applied when the user depresses the keys. Devices and computer readable medium for implementing the method are also provided.
摘要:
A mobile communications device, server, and method for providing security on a mobile communications device are described. In accordance with one example embodiment, the mobile communications device comprises: a processor; a communications subsystem connected to the processor operable to exchange signals with a wireless network and with the processor; a storage element connected to the processor and having a plurality of application modules and data stored thereon, the data comprising at least user application data associated with the application modules and service data including data for establishing communications with the wireless network; and a security module operable to detect policy messages received by the mobile communications device, wherein the security module is further operable to perform a security action if a first policy message to enforce a first data protection policy is received and a subsequent policy message to enforce a second data protection policy is not received within a predetermined duration from the time at which the first policy message is received; and wherein the security action comprises erasing or encrypting at least some of the data on the storage element.
摘要:
A mobile communications device, method and computer program product for providing security on a mobile communications device are described. In accordance with one example embodiment, the mobile communications device comprises: a processor; a communications subsystem connected to the processor operable to exchange signals with a wireless network and with the processor; a storage element connected to the processor and having a plurality of application modules and data stored thereon, the data comprising at least user application data associated with the application modules and service data including data for establishing communications with the wireless network; and a security module operable to detect a locked state of the mobile communications device and initiate a lockout data protection timer for a predetermined duration upon detection of the locked state; and wherein the security module is operable to, after the lockout data protection timer has been initiated, detect if a password shared by the user and the mobile communications device is entered through a user input device within the predetermined duration of the lockout data protection timer; wherein the security module is operable to terminate the lockout data protection timer if entry of the password is detected within the predetermined duration; and wherein the security module is operable to perform a security action comprising erasing or encrypting at least some of the data on the storage element if entry of the password is not detected within the predetermined duration.
摘要:
Systems and methods for processing messages within a wireless communications system are disclosed. A server within the wireless communications system maintains a list of certificates contained in devices that use the server. The server synchronizes or updates the list of certificates based on information contained in message to and from the device. By providing a server with certificates associated with devices that use the server, and providing a system and method for synchronizing the certificates between the device and server, the server can implement powerful features that will improve the efficiency, speed and user satisfaction of the devices. The exemplary embodiments also enable advantageous bandwidth savings by preventing transmission of certificates unnecessarily
摘要:
A system and method for providing code signing services to software application developers or to other individuals or entities that wish to have applications digitally signed. Signing of the applications may be required in order to enable the applications to access sensitive APIs and associated resources of a computing device when the applications are executed on the computing device. In one embodiment, a method of providing code signing services will comprise at least some steps relating to registering the entities that seek access to sensitive APIs as controlled by the code signing authority, and managing the accounts of the registered entities.
摘要:
A system and method for providing code signing services to software application developers or to other individuals or entities that wish to have applications digitally signed. Signing of the applications may be required in order to enable the applications to access sensitive APIs and associated resources of a computing device when the applications are executed on the computing device. In one embodiment, a method of providing code signing services will comprise at least some steps relating to registering the entities that seek access to sensitive APIs as controlled by the code signing authority. These steps are performed in order to establish trust relationships with those entities. The method of providing code signing services will also comprise additional steps relating to receiving and processing the code signing requests from such entities.