摘要:
A method and system for performing garbage collection involving sensitive information on a mobile device. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.
摘要:
Different target transmit powers are determined for different wireless transmissions from a wireless device. The target transmit power of a wireless transmission may depend upon whether any transmitters other than the device to which the wireless transmission is to be sent are within range of the sending wireless device. The target transmit power of a wireless transmission may be based, at least in part, on a current location of a device to which one or more frames carried by the wireless transmission are addressed. The target transmit power of a wireless transmission may be based, at least in part, on confidentiality of data carried by the wireless transmission.
摘要:
A first device has a display that is able to show information. The information is to be exchanged with a second device. The information is cleared from the display following receipt of an indication from the second device that the information has been successfully inputted at the second device.
摘要:
A system includes a wireless-enabled smart card reader able to be connected concurrently to at least two devices and a mobile device able to be connected wirelessly to the smart card reader and to control connections of the smart card reader.
摘要:
Users of a computer are prevented from directly accessing certain hardware for which a driver is installed on the computer. The users are provided a limited, indirect manner to access the hardware for a specific purpose or to do a specific job. One example of such hardware is a wireless hardware communication interface. The wireless activity of the computer may be restricted so that the wireless hardware communication interface is prevented from communicating with any devices compatible with the wireless hardware communication interface other than one or more specific devices.
摘要:
A first device has a display that is able to show information. The information is to be exchanged with a second device. The information is cleared from the display following receipt of an indication from the second device that the information has been successfully inputted at the second device.
摘要:
A portable wireless communications device to be carried by a holster includes a portable housing carrying a wireless transceiver, a holster sensor, a local alert indicator, a user authentication input device, and a controller. The controller may store data and is connected to the wireless transceiver, the holster sensor, the local alert indicator, and the user authentication input device. The controller may be switchable to a pickpocket mode for activating the local alert indicator, wirelessly sending at least one remote alert message, and rendering unusable at least a portion of the stored data upon removal from the holster unless a user authentication is input before expiration of a predetermined time.
摘要:
A smart card reader receives an Answer to Reset (ATR) from a smart card and transmits the ATR over a communication link to a computing device without waiting for an ATR request from the computing device. The computing device may cache the ATR and use it for subsequent communication sessions with the smart card.
摘要:
Systems and methods for normalizing the control parameters associated with trading algorithms, providing analytic data to traders in discrete time intervals to assist in the analysis of trading performance, and providing crossing opportunities to orders that have been committed to a trading algorithm but have not yet been executed, are provided. A dashboard to allow a trading professional more effective use of multiple algorithms can be created. Parameters associated with multiple algorithms can be normalized and tuned rapidly from a single user interface. Trading performance can be reviewed in discrete time intervals and execution venues. Traders can review a performance score for a trading algorithm and select an algorithm based in part on their commission budget. Block trading opportunities can be available with a crossing engine or external ATS.
摘要:
A method of controlling reminders for an electronic calendar event record includes: generating a reminder notification at a first electronic device, the reminder notification associated with the calendar event record, providing an option at the first electronic device for taking a first action at the first electronic device and taking a second action at a second electronic device, the first action differing from the second action, generating an update command at the first electronic device for taking the second action at the second electronic device in response to receipt of selection of the option at the first electronic device, and sending the update command from the first electronic device for the second electronic device.