Abstract:
A method and system for attaching a scan to an email reply utilizing a mobile communications device and any standard email client. A scan-to-email attachment module can be configured in association with the mobile communications device. A contact address can be added to a list of email contacts available via the mobile communications device. The contact address can be added by the user to a reply-to email as an additional address utilizing the mobile communications device so that a scan document can be sent as an attachment to an email address listed in the reply-to email. A server monitoring the contact address can be polled by the scan-to-email attachment module and a scan request initiated with respect to a scanner. An email client on the mobile communications device sends the scan document as an attachment to an email address listed in the reply-to email composed by the user. A fresh email can also be composed and the contact address can be added so that the email containing the scan document can be sent to the recipients.
Abstract:
A method and system for establishing secure communication between a MFD (Multi-Function Device) and a mobile communications device. A virtual private network (VPN) connection can be established between the mobile communications device and the MFD via a rendezvous server utilizing a random displayed code on a user interface of the MFD. An application with respect to the mobile communications device can be started by the user to connect to the MFD and the displayed code can be read by the mobile communications device utilizing an image capturing unit associated with the mobile communications device. The connection key presented by the mobile application can be validated by the rendezvous server. The rendezvous server can be polled for an incoming traffic and the traffic can be forwarded to a service hosted by the MFD utilizing an application running on the MFD.
Abstract:
Methods and systems receive location identification tokens from transmitters using a portable computerized device. A first location identification token is received from a first location transmitting device, while the portable computerized device is within a predetermined distance from a designated location. A second location identification token is received from a second location transmitting device. A current location signature is calculated using the first and second location identification tokens. A previously stored location signature associated with the first and second location identification tokens is obtained from a computer readable storage medium. The current location signature is compared with the previously stored location signature to determine a similarity measure. The location identification tokens and the current location signature are stored in a memory and transmitted to a server. The presence of the portable computerized device at the designated location is verified based on the location identification tokens and the current location signature.
Abstract:
A method and system for attaching a scan to an email reply utilizing a mobile communications device and any standard email client. A scan-to-email attachment module can be configured in association with the mobile communications device. A contact address can be added to a list of email contacts available via the mobile communications device. The contact address can be added by the user to a reply-to email as an additional address utilizing the mobile communications device so that a scan document can be sent as an attachment to an email address listed in the reply-to email. A server monitoring the contact address can be polled by the scan-to-email attachment module and a scan request initiated with respect to a scanner. An email client on the mobile communications device sends the scan document as an attachment to an email address listed in the reply-to email composed by the user. A fresh email can also be composed and the contact address can be added so that the email containing the scan document can be sent to the recipients.
Abstract:
A system and method for verifying proximity to a computational tag by receiving a first token from a server and transmitting the first token to the computational tag. The computational tag can verify the first token and generate a second token based on the first token where the second token includes a signature of the computational tag. The computational tag can transmit the second token to the mobile device and the mobile device can transmit the second token to the server. The server can verify the second token and allow access to a messaging service based on the verification of the second token.