Abstract:
A system and method of providing information stored in a memory is provided. The system comprises an information repository for storing information and an access module for providing access to the information in response to a predetermined operation performed on a man-machine interface. The method includes the steps of storing information in a memory and providing access to the information in dependence upon at least one predetermined operation.
Abstract:
A method for processing security communication protocol compliant signed receipts at a mobile communication device linked to a host system is provided. The host system receives an email message linked to a digital signature, and a signed receipt. The host system redirects the signed receipt to the mobile communication device. The host system determines if the email message is available at the mobile communication device, and if not, the host system retrieves the email message and redirects the email message to the mobile communication device. The mobile communication device can then verify the signed receipt based on the email message. Optionally, rather than the email message, the host system retrieves and/or recalculates data elements associated with the email message and required to verify the signed receipt, and redirects these data elements to the mobile communication device. A related system is provided, as well as server computer program for the host system, and device computer program for the mobile communication device.
Abstract:
A system and method for facilitating the establishment of a virtual private network between a network and a remote computer, the system having: a mobile device connectable to the remote computer and storing a user profile, virtual private network information, and password information; virtual private network software being located on one of the mobile device and the remote computer; an access point communicating with the network; and communication means for communications between the access point and one of the mobile device and the remote computer, wherein the user profile, virtual private network information, and password information is passed to the virtual private network software upon connection of the mobile device to the remote computer, the virtual private network software using the user profile, virtual private network information, and password information to establish a virtual private network through the communications means and the access point to the network.
Abstract:
A system and method for facilitating the establishment of a virtual private network between a network and a remote computer, the system having: a mobile device connectable to the remote computer and storing a user profile, virtual private network information, and password information; virtual private network software being located on one of the mobile device and the remote computer; an access point communicating with the network; and communication means for communications between the access point and one of the mobile device and the remote computer, wherein the user profile, virtual private network information, and password information is passed to the virtual private network software upon connection of the mobile device to the remote computer, the virtual private network software using the user profile, virtual private network information, and password information to establish a virtual private network through the communications means and the access point to the network.
Abstract:
A method, apparatus and system for applying feature controls to features on a wireless device while the mobile is in a geographic area is provided. The wireless device receives instructions from a wireless network indicating which feature controls to apply. The wireless device determines that its position is within the geographic area and applies the feature controls.
Abstract:
Methods and apparatus for increasing security and control of voice communication sessions, such as Push-To-Talk (PTT) over Cellular (PoC) sessions, using digital certificates are disclosed. A certificate control mechanism of a private communication network is used to help facilitate secure PoC sessions for mobile communication devices associated with the private network. The certificate control mechanism of includes a certificate controller which is adapted to communicate with a Certificate Authority (CA) component which produces and stores a plurality of digital certificates for the mobile devices. The certificate controller is further adapted to communicate with one of a PoC server and a PoC group list server through a public communication network (e.g. the Internet) so as to provide the plurality of digital certificates for secure PoC communication sessions for chat groups which include the plurality of mobile communication devices. In one illustrative technique, a request message for participation in a PoC session is received by an authentication component of a PoC server from a mobile device. The request message is signed with use of a private key of a digital certificate which may be associated with the mobile device, an end user of the mobile device, or a chat group which includes the mobile device. An authentication procedure is performed on the request message by the authentication component. The authentication procedure includes retrieving a public key associated with the digital certificate and attempting to validate the signature with use of the public key. Processing for the PoC communication session is permitted for the mobile communication device if the authentication is successful, and otherwise denied. Several other techniques and variations are described.
Abstract:
Methods of detecting e-mail messages that are spoofed to appear from internal to a private network are provided. The methods involve examining the header of messages to determine if they purport to originate from internal to the network when in fact they originate external to the network. The presence of an Internet header can be used to this effect in private networks that do not use Internet headers to exchange internal email.
Abstract:
A system and method for facilitating the establishment of a virtual private network between a network and a remote computer, the system having: a mobile device connectable to the remote computer and storing a user profile, virtual private network information, and password information; virtual private network software being located on one of the mobile device and the remote computer; an access point communicating with the network; and communication means for communications between the access point and one of the mobile device and the remote computer, wherein the user profile, virtual private network information, and password information is passed to the virtual private network software upon connection of the mobile device to the remote computer, the virtual private network software using the user profile, virtual private network information, and password information to establish a virtual private network through the communications means and the access point to the network.
Abstract:
A universal connector apparatus for a mobile device and in communication with the mobile device, the apparatus comprising: at least one universal serial bus (USB) connector providing at least one connection; at least one USB host controller configured to control the at least one USB connection; a microprocessor configured to control the at least one USB host controller, the microprocessor having an operating system; a USB device control interface on the mobile device configured to communicate and control the universal connector apparatus; and a USB driver configured to operate within the operating system to enable the mobile device to connect to one or more peripherals via the at least one USB connector.
Abstract:
Messages with an associated attachment document are first delivered to a mobile device without the attachment document. If the mobile device user wishes to review attachment data related to the attachment document, the user submits an attachment processing request to an attachment server that handles the attachment processing requests to provide the attachment data in one of several possible formats to the user.