摘要:
A method for hindering a cold boot attack on a user equipment (UE) is provided. The method includes, in response to detection of the cold boot attack, executing prioritized security procedures. A user equipment (UE) is also provided that includes a processor configured to execute prioritized security procedures responsive to detection of a cold boot attack.
摘要:
A method and apparatus for processing digitally signed messages in which address mismatch errors are detected. In at least one aspect, the number of address mismatch errors reported to a user for a message may be minimized for messages that properly incorporate message portions signed by someone other than the sender of the message, as may be the case where the message contains a conversation thread for example, by performing at least one pre-determined action for digital signatures corresponding to signed data appearing after a message separator. The message separator may indicate that the message contains data from an older forwarded message or from an older message that has been replied to, for example. The at least one-predetermined action may comprise bypassing verification of address matches for those digital signatures, or verifying address matches for those digital signatures but suppressing user notification of any address mismatch errors, for example.
摘要:
A device certificate binds an identity of a first device to a public key of the first device. The first device comprises a certificate authority service that creates for a process on the first device a process certificate certifying one or more capabilities of the process on the first device. The process certificate is presented to the second device. Upon validating the process certificate using the device certificate, the second device permits the process on the first device to have on the second device one or more of the verified certified capabilities.
摘要:
A system and method for sending encrypted messages to a distribution list that facilitates the sending of such messages only to individuals or other entities associated with the distribution list that will be able to read the message. In one embodiment, the method comprises the steps of: identifying a distribution list address in a message; determining one or more member addresses associated with the distribution list address; for each member address, determining if a public key for a member identified by the respective member address is available on the computing device; encrypting the message to each member identified by the one or more member addresses for which a public key for the respective member is available on the computing device; sending the encrypted message to the distribution list address if each of the one or more member addresses associated with the distribution list identifies a member for which a public key is available on the computing device; and sending the message to each of the one or more member addresses that identifies a member for which a public key is available on the computing device otherwise.
摘要:
The present invention provides a system and method for multi-rate, high-sensitivity CDR, including a variable/adjustable decision threshold, RF input clock recovery, and OE conversion feature. The system includes an optical input connector, CDR circuit, decision threshold circuit, internal power supply, OE converter, external electrical output, and multiple clock outputs. The system is assembled in a single, stand-alone unit. The system includes an OC-192 data output, and OC-192 (9.953-10.709 GHz) and ¼ OC-48 (2.488-2.677 GHz) clock outputs. The decision threshold level is adjustable and optimized by a system user. The system is also used in combination with a digital communications analyzer. A recovered clock of the CDR circuit provides trigger for the DCA. The system includes an electrical input connector. Optionally, the system triggers directly from an RF electrical input in substitution of an optical input. The system is also used to convert an optical signal to an electrical signal, bypassing the CDR circuit.
摘要:
An improved electronic device and method provide an improved clock feature having an alarm clock function that advantageously provides an indication to a user that the alarm is set, i.e., is in an ON condition, by outputting the alarm time itself.
摘要:
Techniques for use in an electronic device which includes a camera module for producing photographic images are described. An input request for capturing a photographic image is detected via a user interface of the electronic device. In response to detecting the input request, a photographic image is captured via the camera lens using the camera module, and the captured photographic image is produced in a visual display. In addition, a zoomed-in portion of the image is produced in the visual display, simultaneously with the display of the image. The zoomed-in portion of the image may be a picture-in-picture (PIP) window or virtual magnifying glass window overlaid with the image, for example. The image may include a blur characteristic which is only visually apparent from the zoomed-in portion of the image, in which case the image may be manually deleted by the user so that another photographic image may be captured.
摘要:
Operation of a GPS receiver on a wireless communications device is controlled by determining whether the device is stationary or in motion. Motion determination is accomplished by analyzing radiofrequency signal traces, e.g. GSM signal traces, received from one or more nearby base stations. A three-tiered analysis provides a progressively more accurate determination as to whether the device is moving or stationary while providing, in certain instances, a more rapid determination than prior-art techniques. When the device is determined to be stationary, the GPS receiver can be deactivated. When the device is determined to be moving, the GPS receiver can be reactivated.
摘要:
A method for hindering a cold boot attack on a user equipment (UE) is provided. The method includes, in response to detection of the cold boot attack, executing prioritized security procedures. A user equipment (UE) is also provided that includes a processor configured to execute prioritized security procedures responsive to detection of a cold boot attack.
摘要:
A wireless device (WD) is associated with a preprogrammed user roaming setting and an automated adjustment algorithm stored in operative communication with the device. The algorithm is initiated and run when the device enters a roaming area, thereby automatically activating the roaming setting. A user response query is operatively connected to the automated adjustment algorithm, and operates as a switch for the automated adjustment algorithm, which initiates changing the user settings in accordance with the roaming setting. A user available query is connected to the user response query, to determine if the wireless device is in use, and to generate a notification if the device is idle or a prompt if the device is in use. An output from the switch of the user response query selectively enables the automated adjustment algorithm responsive to at least one of a responsive and a nonresponsive input to the user response query.