Abstract:
Systems and methods for monitoring data input are disclosed. A dataset entered into a non-password field is received. Based on the dataset meeting one or more criteria for a likely password, a determination as to whether the dataset is inadvertently entered into the non-password field is made. Based on determining that the dataset is inadvertently entered into the non-password field, further processing of the dataset is inhibited.
Abstract:
Systems and methods for maintaining encryption keys are disclosed. An encrypted master key is determined by encrypting a master key based on an initial user password and discarding the master key. The encrypted master key is stored. A request for the master key including a present user password is received and verified based on comparison to the initial user password. Based on failure of verifying the present user password, a failed attempt counter that is maintained within a secure container is created. User password based access to the master key is locked out based on the failed attempt counter exceeding a defined value.
Abstract:
Systems and methods for establishing a data connection between a mobile device and a peripheral. The mobile device is configured to determine whether to handle user approval of the data connection between the mobile device and the peripheral. Through the mobile device, an input mechanism is provided for the user to provide input. The input is used in determining whether to approve the data connection between the mobile device and the peripheral.
Abstract:
A mobile communication device causes a communication session to be established with a host server of a communication network. The mobile device performs communication operations in the communication session for activating a communication service, such as a data synchronization service, with the host server. In the communication session, the mobile device also receives configuration information which includes information for use in constructing a request message for obtaining a digital certificate from a certificate authority (CA). After receipt of the configuration information, the mobile device constructs the request message for the digital certificate and causes it to be sent to the host server. In response, the host server requests and obtains the digital certificate from the CA on behalf of the mobile device, and thereafter “pushes” the received digital certificate to the mobile device. The mobile device receives the digital certificate and stores it for use in subsequent communications.
Abstract:
A method of controlling an electronic device having a display moveable relative to a keyboard, between a first position in which the keyboard is not exposed and a second position in which the keyboard is exposed. The method includes, detecting movement of the display relative to the keyboard, to a third position, between the first position and the second position, in which the keyboard is partially exposed, determining a location of the display relative to the keyboard when the display is in the third position relative to the keyboard, identifying an action associated with the third position, and performing the action associated with the third position.
Abstract:
A method for updating an electronic mail (“email”) message presented to a user on a display screen of a data processing system, the email message belonging to a thread of email messages received by the data processing system, the method comprising: determining whether one or more of the email messages in the thread was received after the email message is opened on the display screen; and, if so, displaying an update message on the display screen indicating that one or more of the email messages in the thread was so received.
Abstract:
A method for generating a password for accessing a password-protected service is disclosed. A password requirements database and default password generation requirements are stored in a memory of a computing device. The password requirements database includes one or more service profiles, where each service profile includes an identifier for a service and an associated indication of requirements of valid passwords for the service. If the password requirements database includes a service profile associated with the password-protected service, the password is randomly generated to comply with requirements of valid passwords indicated in the service profile associated with the password-protected service; otherwise, the password is randomly generated to comply with the default password generation requirements.
Abstract:
This disclosure relates to management of privileges associated with applications accessible by users of electronic devices. In one aspect, an electronic device detects that a privilege has been revoked, shuts down any application running on the electronic device that has previously accessed the privilege, and restarts any application that was shut down, the restarted application no longer having any access to the revoked privilege. In another aspect, an electronic device keeps a log of which applications have previously accessed which privileges, receives a new set of privileges associated with applications, determines that a privilege has been revoked, and if the log indicates that an application previously accessed the privilege, resets the electronic device. In a further aspect, a method sets privileges associated with applications, records which electronic devices have which applications, revokes a privilege, and instructs those electronic devices having applications to which the privilege is associated to reset themselves.
Abstract:
A mobile communications device, method, and computer program product for providing security on a mobile communications device are described. In accordance with one example embodiment, the mobile communications device comprises: a processor; a communications subsystem connected to the processor operable to exchange signals with a wireless network and with the processor; a storage element connected to the processor and having a plurality of application modules and data stored thereon, the data comprising at least user application data associated with the application modules and service data including data for establishing communications with the wireless network; and a security module operable to determine if a battery level falls below a predetermined threshold and perform a security action comprising erasing or encrypting at least some of the data on the storage element if the battery power falls below the predetermined threshold.
Abstract:
Systems and methods for establishing a data connection between a mobile device and a peripheral. The mobile device is configured to determine whether to handle user approval of the data connection between the mobile device and the peripheral. Through the mobile device, an input mechanism is provided for the user to provide input. The input is used in determining whether to approve the data connection between the mobile device and the peripheral.