摘要:
An apparatus and method for integrating authentication protocols in the establishment of connections between a controlled-access first computing device and at least one second computing device. In one embodiment, network access user authentication data needed to access the at least one second computing device is transmitted to an authentication server automatically if the user has access to use the first computing device, thereby not requiring the user to manually enter the authentication data needed for such access at the first computing device. The network access user authentication data may be, for example, retrieved from a memory store of the first computing device and/or generated in accordance with an authentication data generating algorithm.
摘要:
Systems and methods for handling electronic messages. An electronic message that is associated with a digital certificate is to be processed. A decision whether to check the validity of the digital certificate is based upon digital certificate checking criterion. An IT administrator may provide to one or more devices configuration data that establishes the digital certificate checking criterion.
摘要:
A wireless communication device (and its related method of operation) includes, if invoked, password protected access to data stored therewithin and/or to normal device operations and further includes duress password checking logic that automatically causes a duress message to be sent if a duress password has been entered. The duress message is preferably sent without maintaining any user accessible indication of such sending. It is also preferred that the password checking logic automatically cause an end-of-duress message to be sent if a normal password is entered after a duress password has been entered. A plurality of different duress passwords may be entered into a duress password portion of data memory in the device.
摘要:
Protection of real-time data such as voice data exchanged as packets between a mobile electronic device and a VPN gateway during a media session over a communications link that includes a wireless network. A first VPN connection is established between the mobile electronic device and the VPN gateway through the communications link, the first VPN connection using key-based encryption to protect data exchanged therethrough. While the first VPN connection is established, a second VPN connection is established between the mobile electronic device and the VPN gateway through the communications link, the second VPN connection using key-based encryption to protect data exchanged therethrough. Real-time data packets are exchanged between the mobile electronic device and the VPN gateway through the second VPN connection.
摘要:
A drill jig for making a channel in a timber for containing flowable preservative comprises a body (10) having a first or perpendicular guide bore (20), a second or oblique guide bore (22) and a third or vertical guide bore (24). The guide bores (22) and (24) intersect in a cylindrical locating spigot (18) and the axes of the guide bores (20) and (22) intersect in the timber to be drilled. A collet (26) on the shank of the drill bit (28) limits the depth of penetration by the lower face (32) of the collet abutting an abutment face (34) on the body (10). The depth of pentration when using the guide bore (20) or (24) is limited by the collet (26) coming into abutment with an adjustable stop (38) on the body (10). No adjustments are necessary as between drilling perpendicular or oblique bores and it is ensured that the bores formed in the timber intersect to form a continuous channel for receiving flowable preservative.
摘要:
Systems and methods of selecting message settings mimetically on a messaging client. When an outgoing message is composed on a messaging client, the messaging client determines whether the outgoing message is related to a received message. Where the outgoing message is related to the received message, the messaging client determines the messaging settings used in the received message, and selects the messaging settings used in the received message to control message characteristics of the outgoing message.
摘要:
The present disclosure describes a method for protecting real-time data exchanged between a mobile electronic device and a VPN gateway over a communications link. The method comprises: establishing a first VPN connection between the mobile electronic device and the VPN gateway through the communications link; establishing, while the first VPN connection is established, a second VPN connection between the mobile electronic device and the VPN gateway through the communications link; providing key information to at least one of the mobile electronic device or VPN gateway through the first VPN connection; and exchanging real-time data packets between the mobile electronic device and the VPN gateway through the second VPN connection, wherein the key information is for encrypting and decrypting the real-time data packets exchanged through the second VPN connection.
摘要:
Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices. Security mode configuration data is used in establishing a security-related mode of operation for the computing devices.
摘要:
Systems and methods for establishing a security-related mode of operation for computing devices. A security-related mode of operation is established through security mode configuration data. The security mode configuration data specifies the proper security mode or modes for operation of the computing devices.
摘要:
An electronic communication device includes a buffer and a controller. The buffer stores characters as they are being input by a user. The controller transmits the stored characters over a network when the number of characters stored exceeds a threshold. The controller also dynamically adjusts the threshold time period.