Abstract:
A communication system is provided with program logic for enforcing an IT Policy specifying suitable encryption encoding levels for corresponding security classification levels (and/or encryption strengths).
Abstract:
A method for automatically configuring an access control point based upon the network resource requirements of an application. The installation of a new application on a mobile device or other user device is accompanied, before, during, or after installation, with the distribution of access control information. An access control point blocks communications based upon access rules. An access update module modifies or sets the access rules based upon the access control information. The access control point and the access update module may be located within the mobile device, within an associated wireless connector system, or in other locations within the mobile communication system. The setting or resetting of the access rules based upon the access control information may be triggered during installation, modification, or removal of the application.
Abstract:
A device coupled to a smart card reader may request random data from a smart card inserted into the smart card reader, and the smart card reader may incorporate the random data into its randomness pool. A device having a source of random data may have a driver installed thereon for another device and the driver may extract random data from the source and transmit it securely over a wireless communication link to the other device. The other device, which may be a smart card reader, may incorporate the extracted random data into its randomness pool. A smart card reader may incorporate traffic received from a smart card inserted therein into its randomness pool.
Abstract:
A cryptographic key is used to secure a communication link between a first device and a second device. Generating the cryptographic key is accomplished by a) generating a first cryptographic key, b) generating a second cryptographic key, c) applying a hash function to packets transmitted over the communication link to create a hash result, and d) applying the hash function to the first cryptographic key, the second cryptographic key and the hash result.
Abstract:
In a system with a policy server, a first device able to communicate with the policy server and a second device able to communicate with the first device and unable to communicate with the policy server, the first device is to act as a policy proxy. The policy server may communicate to the first device a policy for the second device, and the first device may communicate the policy to the second device.
Abstract:
Different target transmit powers are determined for different wireless transmissions from a wireless device, the different transmissions having different security requirements. For example, the security requirements of a particular transmission may include a security ranking of a device to which one or more frames carried by the particular transmission are addressed. In another example, the security requirements of a particular transmission may include the confidentiality of data carried by the particular transmission.
Abstract:
A system and method of protecting data on a communication device are provided. Data received when the communication device is in a first operational state is encrypted using a first cryptographic key and algorithm. When the communication device is in a second operational state, received data is encrypted using a second cryptographic key and algorithm. Received data is stored on the communication device in encrypted form.
Abstract:
A communication device (and its related method of operation), when accessing password protected voicemail services, may invoke an enhanced security feature which effectively masks at least the password digit values from being discernible by feedback to the user. This is especially important where portable wireless communication devices may have pre-stored password data for use with automated voicemail access—even in a “locked” mode. Unauthorized possessors of such a device might utilize conventional audible feedback during password transmission to decipher the password value. However, such lack of security is avoided by masking the password data values from the audible and/or visual user feedback, if any.
Abstract:
Systems and methods of owner application control of an electronic device are provided. Owner application control information is stored on the electronic device and/or one or more remote servers. Owner application control information is consulted to determine if one or more required applications are available for execution on the electronic device. If not, one or more required applications not available are downloaded and installed. This could be in a manner transparent to the user of the electronic device. If one or more required applications are not available on the electronic device, the device can be functionally disabled in whole, or in part, until one or more required applications are available.
Abstract:
A differential calorimetric gas sensor (10) which includes a sensing element (12) having a catalytic layer (14) disposed on a multi-layered substrate (26). Catalytic layer (14) includes an active catalyst region (14a) which oxidizes total combustibles within an exhaust gas stream and a reference catalyst region (14b) which oxidizes selective combustibles within the exhaust gas stream. An electrochemical oxygen source (18) is disposed on an opposite side of multi-layer substrate (26) from sensing element (12). An oxygen sensor cell (170) may be incorporated into electrochemical oxygen source (18). The multi-layered substrate (26) includes a plurality of overlaying insulating layers in which an intermediate layer (60) and a bottom layer (64) support primary heaters (58, 62), and in which another intermediate layer (52) supports compensation heaters (50a, 50b). The primary heaters (58, 62) function to maintain sensor (10) at a substantially constant temperature, while the compensation heaters (50a, 50b) function to restore temperature deviations determined by temperature-sensitive elements (46a, 46b) located on an inner layer (48) overlaying the compensation heaters (50a, 50b) resulting from the catalytic reactions taking place at the surfaces (34a, 34b) of the catalyst regions (14a, 14b). The control circuitry (300) operates to control the primary heater (58, 62) and the compensation heaters (50a, 50b), as well as to minimize the response variations of the temperature-sensitive elements (46a, 46b).