摘要:
A method of event notification on a handheld communications device involves first receiving an indication of an occurrence of an event at the handheld communications device. The communications device comprises a display device, and the event has an associated notification definition for providing a visual notification of the occurrence of the event. The notification definition comprises a content parameter that specifies a scope of the content of the visual notification, and an action parameter that specifies the action to be taken on the communications device after the visual notification is initiated. Then, a visual notification of the occurrence is provided on the display device in accordance with the associated notification definition. The visual notification provides particulars of the event.
摘要:
A method and apparatus for controlling a first display module is provided, the first display module associated with a client device in communication with a server enabled to generate data for display on a second display module having a screen size larger than a screen size of the first display module, the data having an active area. Data is received at the client device. The first display module is controlled to generate a representation of a first portion of the data including the active area, the representation of the first portion representative of a peephole superimposed on the second display module, the peephole less than or equal to a size of a screen of the first display module. Input indicative that the peephole is to be shifted to an edge of the active area is received. The first display module is controlled to generate a representation of a second portion of the data including the edge, such that the peephole is shifted to the edge of the active area.
摘要:
The present disclosure relates generally to the management of privileges associated with certain applications that are accessible by users of electronic equipment, such as, for example, networked computers, mobile wireless communications devices, and the like. In particular, the disclosure is directed to systems and methods for managing privileges associated with particular applications and for revoking these privileges in a timely and robust manner. For example, the device keeps track of which applications get access to which privileges. When policies or application control changes, the system detects which privileges have been revoked for which applications. This can be accomplished by simply comparing the old set of privileges with the new set of privileges. For each revoked privilege for a given application, the system determines if the application has ever accessed that privilege in the past. If an application has accessed a privilege that is now revoked at any time in the past, the device is reset. To ensure that privileges that may be passed between applications are not overlooked, the device is arranged to perform a reset if any revoked privilege accessible by the device is one that may be passed between applications.
摘要:
If a smart card is to be used for a particular purpose, and there is no certificate initialized on the smart card for this purpose, a computerized device enables a user to select one of the certificates already installed in the smart card for the particular purpose. The selected certificate may be imported into the computerized device.
摘要:
Various embodiments are described herein for a mobile communication device that utilizes a smart battery. The mobile device includes a main processor for controlling the operation of the mobile communication device. The smart battery is coupled to the main processor and provides supply power. The smart battery includes a battery processor for controlling the operation of the smart battery and communicating with the main processor, and a battery module having one or more batteries for providing the supply power. A battery interface is provided for coupling between the main processor and the battery processor for providing communication therebetween. The battery interface comprises a data communication line and protection circuitry for protecting the main processor from electrostatic discharge. A communication protocol is also provided for communication between the main processor and the battery processor.
摘要:
In one embodiment, there is provided a mobile communications device comprising: a processor; a communications subsystem operable to exchange signals with a wireless network; a storage element having application modules and data stored thereon, the data comprising at least user application data associated with the application modules and service data including data for establishing communications with the wireless network; and a security module operable to detect policy messages received by the device, and to perform a security action if a first policy message to enforce a first data protection policy is received and a subsequent policy message to enforce a second data protection policy is not received within a predetermined duration from the time at which the first policy message is received; wherein the security action comprises erasing or encrypting at least some of the data on the storage element.
摘要:
A wireless-enabled smart card reader receives an Answer to Reset (ATR) from a smart card and transmits the ATR using a wireless communication link to a computing device without waiting for an ATR request from the computing device. The computing device may cache the ATR and use it for subsequent communication sessions with the smart card.
摘要:
A system comprises a wireless-enabled device that communicates with a wireless-enabled smart card reader to obtain information from or perform operations using a smart card. Commands to access information from a smart card may be sent from the device to the smart card reader, and responses from the smart card may be sent from the smart card reader back to the second device. Communication between the device and the smart card reader via a wireless communication link is slower than communication via a direct link. Communication of two or more commands and/or responses via the wireless communication link may be made more efficient by grouping the commands or responses together in groups.
摘要:
A method is presented to allow pairing of a first wireless-enabled device to a second wireless-enabled device while the first device is locked. A pairing interface is provided on the locked first device to obtain pairing information about the second device. The pairing information is used to pair the first device to the second device and to establish wireless communications therebetween without first requiring that the first device be unlocked.
摘要:
A system and method for protecting master transport encryption keys stored on a computing device. Master transport encryption keys are used to secure data communications between computing devices. In one example embodiment, there is provided a method in which a copy of a master transport encryption key is generated and stored in a volatile store of a first computing device (e.g. a mobile device). This copy of the master transport encryption key can be used to facilitate the decryption of data received at the first computing device from a second computing device (e.g. a data server), even while the first computing device is locked. The method also comprises encrypting the master transport encryption key, with a content protection key for example, and storing the encrypted master transport encryption key in a non-volatile store of the first computing device.