摘要:
A computerized device has an open communication session with a smart card via a smart card reader. The smart card reader and the computerized device cooperate to enable another computerized device to communicate with the smart card over the open communication session. Communication between the other computerized device and the smart card is routed via the computerized device that has the open communication session.
摘要:
A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to a computing device (e.g. a mobile device) to determine status data that can be used to indicate the status of those certificates to a user of the computing device, without having to download those certificates to the computing device in their entirety. The data server is further adapted to transmit the status data to the computing device. In one embodiment, at least one status property of the certificates is verified at the data server in determining the status data. In another embodiment, additional certificate data is determined and transmitted to the computing device, which can be used by the computing device to verify, at the computing device, at least one other status property of the certificates.
摘要:
It is not uncommon for two or more wireless-enabled devices to spend most of their time in close proximity to one another. For example, a person may routinely carry a personal digital assistant (PDA) and a portable digital audio/video player, or a cellphone and a PDA, or a smartphone and a gaming device. When it is desirable to increase the memory storage capacity of a first such device, it may be possible to use memory on one or more of the other devices to temporarily store data from the first device.
摘要:
A method and system for data protection for applications that includes registering applications with a storage cleaning mechanism so that the registered applications can receive notification of impending storage cleaning operations. Upon receiving notification of an impending cleaning operation, the registered applications can release or unreference storage so it can be cleaned of data.
摘要:
A method for updating an electronic mail (“email”) address book comprising: determining whether an email message presented to a user on a display screen of a data processing system contains address information; and, if the email message contains address information: identifying the address information in the email message; determining whether the address information is contained in one or more contact records in the email address book; and, if the address information is not contained in one or more contact records, presenting first means to the user on the display screen for generating a command to add a new contact record to the address book for the address information.
摘要:
Scheduling communications events on an electronic communications device, including (i) storing information about a future communications event, the stored information including stored address information identifying an address of the target recipient and stored time information identifying a scheduled time for the future communications event; (ii) displaying on a display of the communications device, at a time determined in dependence on the stored time information, a notification of the future communications event; (iii) monitoring for a confirmation input through a user input device confirming a user desire to proceed with the future communications event; and (iv) automatically providing the address for the target recipient to the communications module in dependence on the stored address information upon detecting the confirmation input.
摘要:
A portable wireless communications device to be carried by a holster includes a portable housing carrying a wireless transceiver, a holster sensor, a local alert indicator, a user authentication input device, and a controller. The controller may store data and is connected to the wireless transceiver, the holster sensor, the local alert indicator, and the user authentication input device. The controller may be switchable to a pickpocket mode for activating the local alert indicator, wirelessly sending at least one remote alert message, and rendering unusable at least a portion of the stored data upon removal from the holster unless a user authentication is input before expiration of a predetermined time.
摘要:
A system and method for associating message addresses with certificates, in which one or more secondary message addresses are identified and associated with a user-selected certificate. The secondary message addresses are saved in a data structure that resides in a secure data store on a computing device, such as a mobile device. When a message is to be encrypted and sent to an individual using a particular certificate, an address mismatch would not be detected so long as the address to which the message is to be sent matches any of the message addresses associated with the certificate. The message addresses associated with the certificate include any message addresses contained within the certificate itself (“primary message addresses”) as well as any secondary message addresses that have been subsequently associated with the certificate.
摘要:
A communication system is provided with program logic for enforcing an IT Policy specifying suitable encryption encoding levels for corresponding security classification levels (and/or encryption strengths).
摘要:
A method for automatically configuring an access control point based upon the network resource requirements of an application. The installation of a new application on a mobile device or other user device is accompanied, before, during, or after installation, with the distribution of access control information. An access control point blocks communications based upon access rules. An access update module modifies or sets the access rules based upon the access control information. The access control point and the access update module may be located within the mobile device, within an associated wireless connector system, or in other locations within the mobile communication system. The setting or resetting of the access rules based upon the access control information may be triggered during installation, modification, or removal of the application.