Abstract:
A method for securing an instant messaging (“IM”) conversation between at least a first and a second user, the first and second users having a first and a second client, respectively, in communication over a network, the method comprising: receiving a command from the first user through an input device and a graphical user interface (“GUI”) presented on a display of the first client to disable copying of the IM conversation; and, transmitting a message to the second client to inform the second client and the second user that copying of the IM conversation has been disabled.
Abstract:
An internet protocol loopback wireless data protocol converter apparatus for a mobile device is provided. The protocol converter apparatus includes at least one loopback interface; at least one internet protocol server operating on one or more ports of any of the at least one loopback interface; a wireless optimized data communications module to connect to a wireless data infrastructure to send and receive wireless optimized data; and at least one protocol converter unit to convert communications in a wireless optimized data protocol to and from standard internet protocol, wherein an internet protocol application can communicate with the at least one server using the loopback interface and data to and from the application can be received and transmitted using the wireless optimized data communications module with conversion by the at least one protocol converter unit.
Abstract:
A mobile device for electronic mailing of data utilizing a data reference, the mobile device having: a communications subsystem for communicating with a wireless gateway; a user interface; a processor interacting with the user interface and the communications subsystem; an electronic mail application adapted to run on the processor; a data application adapted to run on the processor; and memory adapted to be accessed by the electronic mail application and the data application, the memory storing a data reference identifier for data in the data application, the data reference identifier capable of identifying the data on a data server remote from the mobile device, wherein the data application is adapted to interact with the electronic mail application to send data in an electronic mail message, and wherein the data is replaced in the electronic mail message with the data reference identifier.
Abstract:
A method for processing security communication protocol compliant signed receipts at a mobile communication device linked to a host system is provided. The host system receives an email message linked to a digital signature, and a signed receipt. The host system redirects the signed receipt to the mobile communication device. The host system determines if the email message is available at the mobile communication device, and if not, the host system retrieves the email message and redirects the email message to the mobile communication device. The mobile communication device can then verify the signed receipt based on the email message. Optionally, rather than the email message, the host system retrieves and/or recalculates data elements associated with the email message and required to verify the signed receipt, and redirects these data elements to the mobile communication device. A related system is provided, as well as server computer program for the host system, and device computer program for the mobile communication device.
Abstract:
A mobile device for electronic mailing of data utilizing a data reference, the mobile device having: a communications subsystem for communicating with a wireless gateway; a user interface; a processor interacting with the user interface and the communications subsystem; an electronic mail application adapted to run on the processor; a data application adapted to run on the processor; and memory adapted to be accessed by the electronic mail application and the data application, the memory storing a data reference identifier for data in the data application, the data reference identifier capable of identifying the data on a data server remote from the mobile device, wherein the data application is adapted to interact with the electronic mail application to send data in an electronic mail message, and wherein the data is replaced in the electronic mail message with the data reference identifier.
Abstract:
Messages with an associated attachment document are first delivered to a mobile device without the attachment document. If the mobile device user wishes to review attachment data related to the attachment document, the user submits an attachment processing request to an attachment server that handles the attachment processing requests to provide the attachment data in one of several possible formats to the user.
Abstract:
A wireless communication device declares one of a plurality of extended instant messaging states and transmits the declared states to a presence information server. Declared extended instant messaging states for destination devices are received, and an enhanced instant message based on delared extended instant messaging states is generated.
Abstract:
An apparatus and method of controlling unsolicited traffic are disclosed herein. The apparatus and method can be applied to wireless communication networks such as CDMA2000, UMTS, GPRS and the like so that traffic which is not solicited by wireless communication devices operating on those networks is not sent over the air needlessly. The present application provides techniques to block unsolicited traffic based on the identity of a user (for example based on International Mobile Station Identity (IMSI), Network Access Identifier (NAI), Mobile Station Internet Services Digital Network Number (MSISDN), Session Initiation Protocol (SIP) Universal Resource Locator (url)) as opposed to techniques that are based on a session or IP address, such as a traditional firewall. In accordance to this application, user identity based techniques are applied to block unsolicited traffic whenever a user has established a data session. Further in accordance with this application, user identity based techniques are persisted across changes in IP address and/or session.
Abstract:
A system and method of providing information stored in a memory is provided. The system comprises an information repository for storing information and an access module for providing access to the information in response to a predetermined operation performed on a man-machine interface. The method includes the steps of storing information in a memory and providing access to the information in dependence upon at least one predetermined operation.
Abstract:
A system and method of providing information stored in a memory is provided. The system comprises an information repository for storing information and an access module for providing access to the information in response to a predetermined operation performed on a man-machine interface. The method includes the steps of storing information in a memory and providing access to the information in dependence upon at least one predetermined operation.