Abstract:
The described embodiments relate generally to devices, methods and systems for managing access to a memory card, such as a smart card, by a plurality of accessing devices. Certain embodiments relate to a smart card reader for managing concurrent access to a smart card, wherein when a channel manager receives a close session request from a first accessing device, and a first session is open on a first channel for the first accessing device and a second session is open on a second channel for a second accessing device, the channel manager is configured to: issue a close channel command to the smart card to close the second channel; issue the close session request from the first accessing device to the smart card; and issue a further session request to the smart card to re-open the first channel, and continue the second session on the re-opened first channel.
Abstract:
A method and apparatus for processing digitally signed messages in which address mismatch errors are detected. In at least one aspect, the number of address mismatch errors reported to a user for a message may be minimized for messages that properly incorporate message portions signed by someone other than the sender of the message, as may be the case where the message contains a conversation thread for example, by performing at least one pre-determined action for digital signatures corresponding to signed data appearing after a message separator. The message separator may indicate that the message contains data from an older forwarded message or from an older message that has been replied to, for example. The at least one-predetermined action may comprise bypassing verification of address matches for those digital signatures, or verifying address matches for those digital signatures but suppressing user notification of any address mismatch errors, for example.
Abstract:
Embodiments described herein provide a user with the ability to download a selected attachment document that is associated with a message received on a mobile device. Attachment data corresponding to the selected attachment document can be downloaded according to at least one of a native application attachment content handling option and a client-server attachment content handling option.
Abstract:
The present disclosure relates generally to the management of privileges associated with certain applications that are accessible by users of electronic equipment, such as, for example, networked computers, mobile wireless communications devices, and the like. In particular, the disclosure is directed to systems and methods for managing privileges associated with particular applications and for revoking these privileges in a timely and robust manner. For example, the device keeps track of which applications get access to which privileges. When policies or application control changes, the system detects which privileges have been revoked for which applications. This can be accomplished by simply comparing the old set of privileges with the new set of privileges. For each revoked privilege for a given application, the system determines if the application has ever accessed that privilege in the past. If an application has accessed a privilege that is now revoked at any time in the past, the device is reset. To ensure that privileges that may be passed between applications are not overlooked, the device is arranged to perform a reset if any revoked privilege accessible by the device is one that may be passed between applications.
Abstract:
Embodiments described herein address mobile devices with non-secure operating systems that do not provide a sufficient security framework. More particularly, the embodiments described herein provide a set of applications to the device for providing security features to the non-secure operating system.
Abstract:
Embodiments of the systems and methods described herein facilitate the transmitting, receiving, and processing of encoded messages wherein the header fields in the message header are protected. In one embodiment, the contents of the header fields to be protected are inserted into the message body as one or more additional lines of text, for example, prior to encoding and transmitting the message to a message recipient. Upon receipt of the message, the message recipient processes the encoded message such that the contents of the protected header fields can be extracted from the message body. Accordingly, by inserting the contents of the header fields to be protected into the message body, the header fields may be protected using existing standards and protocols for facilitating secure message communication.
Abstract:
An apparatus for and a method of measuring tension in a handrail for an escalator or moving walkway provides for three support or contact points on the handrail. Two outer or first and second support points are provided by rollers at either end of the support bar. A centre point is provided by a suction cup or other attachment device that grasps the handrail. The centre point is displaced relative to the first and second points by an amount less than a clearance between the handrail and an underlining guide. This displacement and the load necessary to cause the displacement, together with the overall dimensions of the apparatus enable the tension in the handrail to be provided. The use of a suction cup effectively overcomes the requirement to provide a centre point on the opposite side of the handrail from the two other support points, this other side not otherwise being accessible in use.
Abstract:
The invention relates to remote access systems and methods using automatic speech recognition to access a computer system. The invention also relates to an intelligent agent resident on the computer system for facilitating remote access to, and receipt of, information on the computer system through speech recognition or text-to-speech read-back. The remote access systems and methods can be used by a user of the computer system while traveling. The user can dial into a server system which is configured to interact with the user by automatic speech recognition and text-to-speech conversion. The server system establishes a connection to an intelligent agent running on the user's remotely located computer system by packet communication over a public network. The intelligent agent sources information on the user's computer system or a network accessible to the computer system, processes the information and transmits it to the server system over the public network. The server system converts the information into speech signals and transmits the speech signals to a telephone operated by the user.
Abstract:
The composite electrolyte for use in a thin plate rechargeable lithium battery comprises a porous or micro-porous inert, multi-layered polymer separator laminate which carries an adherent second polymer coating containing a dissociable lithium compound, and the multi-layered separator having adherent solid second polymer layer, is impregnated with an organic liquid containing another lithium salt. The porous or micro-porous separator laminate is made of multiple polymer layers, at least one of the member layers having melting temperature at least 20-C below the melting temperature of the other polymer member layers. The composite porous electrolyte is inserted between the electrodes of a rechargeable lithium battery. In another embodiment the porous polymer separator sheet has an adherent, dissociable lithium compound containing, solid second polymer layer on each of its major faces.