摘要:
A system and method of sending an e-mail message associated with a wireless device is provided. A request to forward or reply to an original e-mail message is sent from the wireless device to a server. The request contains one or more recipients and includes a message identifier of an original e-mail message. A portion indicator is provided for retrieving portions of the original e-mail message identified by the message identifier. An e-mail message is sent to the one or more recipients comprising any added user text and the one or more retrieved portions of the original e-mail message such that text of the original message that the user may not be aware is not forwarded to new recipients.
摘要:
Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, sign the composite message. Since signing the composite message involves access to a private key, access to that private key is secured such that such access to the private key can only be arranged responsive to an explicit request for a hash that is to be signed using the private key.
摘要:
A method can output content of interest of a structured electronic document from a computer or distributed computer system having a processor and memory. The method includes loading a common expression and a data structure definition into memory, the common expression identifying a content element in a first structured electronic document, the data structure definition defined according to the common expression; creating in memory an instance of a data structure defined by the data structure definition; applying with the processor the common expression to a second structured electronic document to extract a content element from the second structured electronic document; storing the extracted content element in the instance of the data structure; and populating a template structured electronic document using the instance of the data structure to produce an output structured electronic document.
摘要:
Provided is a method and apparatus for sharing information from a communication device. The communication device is to send first information to a first apparatus and second information to a second apparatus. In accordance with an embodiment of the application, the communication device combines the first information and the second information in a single message and then sends the message to a network node. In accordance with another embodiment of the application, the network node separates the first information from the second information and sends the first information and the second information to the first apparatus and the second apparatus, respectively. Note that the communication device did not have to send separate messages to the apparatuses and therefore there is a reduction in number of messages sent by the communication device. This reduction has an effect of reducing network utilization by the communication device.
摘要:
Method and system for controlling application access to a shared resource in a runtime environment. The shared resource is owned by a remote resource owner. An access control ticket including a permission for the shared resource, a cryptographically verifiable remote resource owner identifier and a cryptographically verifiable application owner identifier are generated. The access control ticket is approved and signed by the remote resource owner, and transmitted to the runtime environment. The application, when executed in the runtime environment, accesses the resource based on the permission.
摘要:
A method and apparatus for secure record protocol in a system with a server and a client, the method having the steps of: utilizing a mobile user credential as an input to a key generator, the mobile user credential being known to both the server and the client; generating one or two public key-private key pairs based on the mobile user credential input; and sending a message signed with a private key.
摘要:
A secure correlation identifier (SCID) for authentically correlating notifications received from event sources with subscriptions, a SCID authentication system and method of filtering unsolicited messages are provided. The SCID comprises a correlation identifier for making the SCID unique, a sequence of bits concatenated with the correlation identifier and a secure tag concatenated with the concatenation of the correlation identifier and the sequence of bits. The system comprises a SCID generator for generating a SCID to be used in a message and a SCID authenticator for authenticating the SCID. The method comprises the steps of receiving a notification message having a SCID, verifying that that SCID is authentic, accepting the message if the SCID is authentic and rejecting the message if the SCID is not authentic.
摘要:
A method and system for establishing a secure over-the-air (OTA) connection between a connection owner and a server, the connection owner being associated with a wireless device connected to the server via a communications network. A secure session is instantiated on behalf of the connection owner, the secure session being maintained by the server and defining a context for the secure OTA connection. A registration key and a reset key are defined, and stored in association with the secure session on both the server and the wireless device. Access to the secure session is controlled using at least the registration key, and the secure session is maintained on the server only as long as the connection owner has a valid registration key.
摘要:
An application that was not internationalized when coded may be internationalized through the addition of interception and localization logic and tables without modification of the original application logic. The interception logic may be configured to intercept calls to an application component and invoke localization logic in response to an intercepted call to the application component. The interception logic may use dynamic proxies to intercept method calls from a client component to an application component both before and after the execution of the method. The interception logic may use JAVA reflection to determine whether input parameters or return values associated with the method call are localizable. The application component logic may operate on data stored in a primary database table in which the data is represented in the system default locale.