摘要:
A first device has a display that is able to show information. The information is to be exchanged with a second device. The information is cleared from the display following receipt of an indication from the second device that the information has been successfully inputted at the second device.
摘要:
A system includes a server, a first client device to communicate in an authenticated and secured manner with the server over a first communication link, and a second client device to communicate in an authenticated and secured manner with the first client device over a second communication link. The first client device is to cause the server and the second client device to share cryptography information. The cryptography information may then be used to secure a third communication link between the server and the second client device that does not include the first client device.
摘要:
Systems and methods for handling restoration operations for a mobile device. A mobile device receives a kill pill command, wherein the command causes some or all data on the mobile device to be wiped. An indicator is stored to indicate that the kill pill command was sent to the mobile device. The indicator is used to determine whether a program should be wiped from the mobile device.
摘要:
Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices. Security mode configuration data is used in establishing a security related mode of operation for the computing devices.
摘要:
Systems and methods for searching secure electronic messages. An input search is received for use in searching content of electronic messages. The search includes searching content of secure electronic messages. The results of the search are provided.
摘要:
A wireless communication system which employs cryptographic functions requiring random data input in a mobile wireless device includes provisions for securely adding randomness to the mobile wireless device. Such added randomness can be securely provided during synchronizing sessions with a device user's base computer via secure wired and/or wireless connections. The new random data can be obtained by software and/or hardware random number generators accessible to the user's base computer and/or from accessible secure external sources (e.g., a secure website source of random data).
摘要:
In accordance with the teachings described herein, systems and methods are provided for securing data for transmission to a wireless device. The disclosed systems and methods may include an electronic messaging system used to send and receive data over a first network and also used to forward data to a wireless device operable in a second network. The electronic messaging system may receive an electronic message encrypted with a first encryption algorithm and addressed to a message recipient in the first network, the message recipient having an associated wireless device operable in the second network. The electronic messaging system may determine that the electronic message is to be transported across the second network to the wireless device, and in response to determining that the electronic message is to be transported across the second network, encrypt the electronic message using a second encryption algorithm and transmit the encrypted message over the second network to the wireless device, with the second encryption algorithm being a stronger encryption algorithm than the first encryption algorithm.
摘要:
Methods and systems for handling attachments on wireless mobile communication devices. An attachment provided with a secure message is received at a message server. The secure message itself was received by the server as an attachment. The secure message is processed in order to locate within the secure message the requested attachment. The located attachment is provided to a mobile device.
摘要:
A method for securing data and resetting a password using a content protection key is provided, in which the content protection key itself is protected by a password. A content protection key is also protected at a data storage device with a key encryption key generated in collaboration with an additional device such as a server. The server stores a private key required to regenerate the key encryption key, but this private key is not provided from the server to the data storage device; rather, a public key derived from the private key is provided by the server. The data storage device combines the received public key and a further private key to derive the key encryption key; the further private key itself is not stored by the data storage device, but rather its matching public key is stored. The content protection key is then encrypted using a password and the derived key encryption key. If the password is lost, data from the server and from the data storage device may be combined to recreate the key encryption key.
摘要:
Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral output device (e.g. a printer, a headset). In exemplary embodiments, the encryption key is generated at the peripheral output device. Data associated with the encryption key is output at the peripheral output device, which can be input by the user at the computing device. The encryption key is then recovered at the computing device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.