摘要:
Interacting digitally communicating devices cooperate to schedule future meetings include a capability to handle conditional acceptance of meeting requests. For example, a conditional acceptance may be subject to Boolean logic functions of the acceptance status(es) of other meeting invitees (e.g., the condition that another specific one or more invitees also accept the meeting request).
摘要:
A system and method for handling secure-format messages in a communication system. The communication system includes a message server that receives secure-format messages from senders and one or more message recipients that may receive messages forwarded from the message server. The message server operates in conjunction with a secure message handler to detect and prevent the delivery of invalid secure-format messages. When a secure-format message is determined to be invalid, the secure message handler may take one or more of the following actions: replace the body of the invalid message with a template message, send a message to the sender of the invalid message indicating the message was rejected, delete the invalid message from the recipient's mailbox, or log the message on the message server and mark it for review. Additionally, the handling of invalid messages is configurable. In particular, the actions to take and the conditions under which those actions are to be taken may be specified by an administrator.
摘要:
Systems and methods for handling messages on a mobile device. A system and method could be configured to receive at a mobile device a message that is associated with a message expiry indicator. If a message expiry indicator is determined to be associated with the received message, then the received message is removed from the mobile device.
摘要:
A system and method for the creation and automated selection and inclusion an automated signature text with an electronic message, wherein the automated selection of the automated signature text is dependent on attributes of the message, the designated recipients, or attributes of the designated recipients as compared to the sender's attributes, such as the encoding type and/or transport method selected for the electronic message or the location of the recipient without the need for multiple user profiles or manual editing by the sender. At least one of a plurality of automated signature texts is associated with at least one encoding type of a plurality of encoding types, at least one message transport type, or with at least one predeterined recipient attribute or the outcome of a comparison of the recipient attribute with the sender's attributes. The appropriate automated signature text is inserted prior to encoding of the message for transport.
摘要:
A medical imaging apparatus for imaging subcutaneous body temperature that comprises a detector (22) for sensing millimetre wave electromagnetic radiation and a collector for collecting radiation emitted from Scanned spot a patient's body and directing it along a collection path (20) to the detector. The collector is configured so that the collected radiation has a defined sensitivity profile across and along substantially the entire length of that path. The collected radiation may have a Gaussian or a Bessel sensitivity profile.
摘要:
Before an application is allowed to execute a secure function, code signing keys associated with the application are analyzed for correspondence with the class that contains the secure function as well as correspondence with the secure function. Optionally, code signing keys associated with the application are analyzed for correspondence with the input parameters to the function.
摘要:
A method for secure bidirectional communication between two systems is described. A first key pair and a second key pair are generated, the latter including a second public key that is generated based upon a shared secret. First and second public keys are sent to a second system, and third and fourth public keys are received from the second system. The fourth public key is generated based upon the shared secret. A master key for encrypting messages is calculated based upon a first private key, a second private key, the third public key and the fourth public key. For re-keying, a new second key pair having a new second public key and a new second private key is generated, and a new fourth public key is received. A new master key is calculated using elliptic curve calculations using the new second private key and the new fourth public key.
摘要:
Before an application is allowed to execute a secure function, code signing keys associated with the application are analyzed for correspondence with the class that contains the secure function as well as correspondence with the secure function. Optionally, code signing keys associated with the application are analyzed for correspondence with the input parameters to the function.
摘要:
A system and method for generating keys that can be used for encrypting and decrypting PIN messages transmitted between mobile devices. In one embodiment, the method comprises defining a function f, where f(x,y)=f(y,x), and for each of first and second mobile devices, evaluating f with one of x and y having the value of the PIN of the respective mobile device. Each one of the first and second mobile devices can then compute a shared messaging key by evaluating f with the other of x and y having the value of the PIN of the other mobile device. The shared key can then be used specifically to encrypt and decrypt PIN messages transmitted between those two mobile devices.
摘要:
A wellhead system for petroleum producing wells comprises a “stack-down” casing hanger configuration. In this stack-down system, the hanger for each successively smaller diameter casing string is landed or “nested” within the hanger for the next larger casing string. This approach allows the pack-off for each casing hanger to be retrieved independently, thus allowing fluid communication to be established with any of the casing annuli after all of the casing strings and hangers have been installed. Thus the pressure in each annulus may be monitored while the well is in production mode.