摘要:
A communications system is to communicate with an application server storing a plurality of applications. The communications system includes a mobile wireless communications device configured to store at least one application from among the plurality of applications, the at least one application having stored version information associated therewith. An intermediate server is configured to update the mobile wireless communications device by at least obtaining respective current version information for associated current versions of the plurality of applications and obtaining the stored application version information from the mobile wireless communications device for the at least one stored application. The stored application version information is compared with the current version information for the at least one stored application. New application portions are downloaded from a current application associated with the current version information, and the new application portions are sent to the mobile wireless communications device.
摘要:
In one embodiment, for example, a method of short range wireless peer-to-peer file sharing is provided. The method includes establishing a short range wireless communications link between a local computing device and a peer computing device and transmitting to the peer computing device over the short range wireless communications link a consolidated catalog of accessible files stored locally in the local computing device, remotely in a remote computing device, or both. The method further includes receiving from over the short range wireless communications link a request by the peer computing device to retrieve a selected one of the files. The method includes responding to a determination that the selected one of the files is stored remotely in the remote computing device by facilitating the retrieval by the peer computing device of the selected one of the files from the remote computing device for delivery to the peer computing device.
摘要:
A communication device provides a message composition interface. In the message composition interface, the communication device presents a maximum allowable remaining number of characters allowable for further entry in the message only when a character count of the number of character inputs received in the message is greater than or equal to a warning count value. The warning count value is less than a maximum allowable number of characters of the message.
摘要:
A mobile wireless communications device may include a housing and a wireless transceiver carried by the housing. The mobile wireless communications device may also include audio transducer carried by the housing, and a controller cooperating with the wireless transceiver to perform at least one wireless communications function. The controller may also cooperate with the at least one audio transducer to convert speech input through the audio transducer to converted text, determine a proposed modification for the converted text, and output from the audio output transducer the proposed modification for the converted text.
摘要:
A memory life extension system and method is provided for managing operation of rewritable memory used to store a monotonically increasing sequence of multiple-byte binary values in a set of one or more memory locations in the rewritable memory. A first value is read in from a set of one or more memory locations. On detection of an instruction to store an incremented value, the incremented value is permuted by applying an encoding, in which a value of a least significant bit changes only on every second increment, to two least significant bits of the incremented value. On overflow of a least significant byte as a result of the increment, a cyclic byte-wise shift is applied to the incremented value. The permuted incremented value is then stored in the one or more memory locations.
摘要:
A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols. The entity charged with authentication maintains a list of previously used bit patterns, extracted from a portion of the authentication message connected to the random component. If the bit pattern has been seen before, the message is rejected; if the bit pattern has not been seen before, the bit pattern is added to the stored list and the message is accepted.
摘要:
A system, method, electronic device and server are provided for metering electronic messages and for managing message traffic within an organization. An electronic message resistance value is stored for recipients within an organization. When a message is composed and addressed at a sending terminal, the electronic message resistance value may be retrieved and displayed at the sending terminal. The message server receiving the composed message for transmission to the recipient sends the message to the recipient in accordance with a priority determined based on the recipient's electronic message resistance; for example, the message may be sent with a low priority attribute, or the transmission of the message to the recipient may be delayed for a set period of time.
摘要:
There is disclosed a system and method for visually representing the probability of spam messages on a mobile communication device. In an embodiment, the method comprises: obtaining a probability that a message is spam; and for each of one or more messages in a message list, visually representing the probability that a message is spam such that any differences in the probabilities as between messages are discernable from the visual representation. In another embodiment, the method further comprises: determining the percentage of the message downloaded to the mobile communication device; and displaying for each of one or more messages appearing in the message list an object or icon visually representing at least one of the probability that the message is spam, or the percentage of the message downloaded to the mobile communication device.
摘要:
In a method of generating a digital signature of a message m, a signature component s of the digital signature is calculated by first masking the long-term private key d using a single additive operation to combine the key d with a first value. The masked value is then multiplied by a second value to obtain component s. The first value is calculated using the message m and another component of the digital signature, and the second value is derived using the inverse of a component of the first value. In this way, the signature component s is generated using a method that counters the effectiveness of side channel attacks, such as differential side channel analysis, by avoiding a direct multiplication using long-term private key d.
摘要:
There is disclosed a system and method for delivering a message to a communication device. In an embodiment, the method comprises obtaining a probability that the message is spam; in dependence upon the probability that the message is spam, determining a variable message size; and sending the message to the communication device in dependence upon the determined variable message size. In an embodiment, the method further comprises receiving a user response whether the message is spam; and if the message is verified as being spam, then filtering the message from the communication device.