Matches 51 - 100 out of 316 < 1 2 3 4 5 6 7 >


Match Document Document Title
9100803 Methods and systems for subscriber identity management in a mobile device  
Methods and systems for managing a pool of subscriber identities, and wirelessly provisioning mobile devices to use one or more of the subscriber identities when a subscriber is roaming on a...
9094429 Server verification of secure electronic messages  
Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system determines whether the size of an...
9088556 Methods and devices for detecting unauthorized access to credentials of a credential store  
Methods and devices for detecting unauthorized access to credentials of a credential store on a computing device are disclosed herein. In one broad aspect, the method comprises monitoring a...
9077485 Automatic security action invocation for mobile communications device  
A mobile communications device, method, and computer program product for providing security on a mobile communications device are described. In accordance with one example embodiment, the mobile...
9071426 Generating a symmetric key to secure a communication link  
A symmetric key to be used to secure a communication link between a first device and a second device is generated as follows: a first symmetric key is generated; a second symmetric key is...
9069974 Deleting confidential information used to secure a communication link  
A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The...
9060273 Authentication server and methods for granting tokens comprising location data  
An authentication server and methods of generating a token for use by a mobile device to establish authorization for the mobile device to access a service provided by a service server, the method...
9053337 Methods and devices for controlling access to a computing resource by applications executable on a computing device  
Methods and devices for controlling access to a computing resource by applications executable on a computing device are described herein. In one example embodiment, method comprises: identifying...
9049006 Systems, devices, and methods for securely transmitting a security parameter to a computing device  
Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at least one embodiment, a representation...
9042671 Method, system and computer program product for optimization of data compression with iterative cost function  
A method, system and computer software product for improving rate-distortion performance while remaining faithful to JPEG/MPEG syntax, involving joint optimization of Huffman tables, quantization...
9037845 System and method for obtaining certificate status of subkeys  
Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is...
9036553 Power saving via variable listen intervals in a WLAN  
A wireless client device is associated with an access point in an association having a value for a listen interval parameter. The wireless client device determines, according to predefined...
9030985 Handling mismatch of cryptographic keys and related battery drain and communication exchange failures  
A wireless communications device stores a first cryptographic key in connection with a profile, the profile indicating a security type requiring no credentials and a network name. An access point...
9026789 Trusted certificate authority to create certificates based on capabilities of processes  
A device certificate binds an identity of a first device to a public key of the first device. The first device comprises a certificate authority service that creates for a process on the first...
9015486 Systems, devices, and methods for outputting alerts to indicate the use of a weak hash function  
Systems, devices, and methods for outputting an alert on a mobile device to indicate the use of a weak hash function are disclosed herein. In one example embodiment, the method comprises receiving...
9013455 Rechargeable active pen and electronic device with corresponding charging dock  
Powered by a battery module, an active pen may transmit a signal that is intended for detection by a touch screen. The active pen may comprise an elongated clip member connected to an elongated...
9003487 Methods and apparatus for maintaining permissions for client/server processing in a communication device  
A communication device has memory for storing a client application module, a server application module, and an operating system module which are executable by one or more processors. The client...
9001511 Portable docking station for portable electronic device  
The present disclosure is generally directed to a portable docking station having a frame, a handle and a counterweight, that receives a portable electronic device. The portable docking station...
8996855 HTTP layer countermeasures against blockwise chosen boundary attack  
A client application, when executed by a processor, is operative to create a HyperText Transfer Protocol (HTTP) request containing a target header that includes a confidential value. The HTTP...
8984604 Locally stored phishing countermeasure  
A system and method for authenticating a resource such as a website or webpage is provided. In response to a script provided with a resource, a verification file is initially generated and stored...
8943323 System and method for provisioning device certificates  
A method is provided for provisioning a device certificate. A device certificate request is transmitted from a communication device to a server in a communication network using an established...
8929327 Reducing handoff latency for a mobile station  
A mobile station is assisted to perform a handoff from a current access point in a current extended service set (ESS) to a new access point in a target ESS. A HandOver Mediator, possibly in...
8922887 Imaging distal end of multimode fiber  
Where a multimode fiber is used for light delivery in a microscope system and a transverse distribution of light exiting a distal end of the fiber is substantially uniform, the distal end is...
8881238 Authentication failure in a wireless local area network  
In the event of an authentication process failure, a mobile station bans a connection profile storing the credentials provided by the mobile station when initiating the failed authentication...
8874764 Saving a connection profile when unable to connect to a wireless local area network  
Various connection parameters of a wireless local area network ‘WLAN’ may be saved in a WLAN client device in a connection profile, even if the WLAN client device is unable to connect to the WLAN.
8874177 Reducing WLAN power consumption on a mobile device utilizing a cellular radio interface  
A system and method of reducing the WLAN power consumption and limiting battery drain of a mobile communications device is provided. The mechanism continuously monitors for changes in the WLAN and...
8868082 Adjusting coverage regions of wireless access points serving as handoff indication mechanism in wireless local area networks  
A mobile communication device includes a processor and a communication subsystem coupled to the processor. The communication subsystem is configured to provide the mobile device with wireless...
US20140304046 Universal Recognition Platform  
A platform for universal recognition (UR) is described. A consumer has one or more UR numbers, each of which is uniquely recognizable within the UR platform. During a transaction with a merchant,...
8843740 Derived certificate based on changing identity  
A first device with a changing identity establishes a secure connection with a second device in a network by acting as its own certificate authority. The first device issues itself a self-signed...
8839370 Restricting access to hardware for which a driver is installed on a computer  
Users of a computer are prevented from directly accessing certain hardware for which a driver is installed on the computer. The users are provided a limited, indirect manner to access the hardware...
8837513 Scheduling and power saving with unscheduled service periods in a wireless system  
A wireless client device associated with an access point records at which time T after a transmission time of a most recent beacon frame it gained access to the wireless medium for transmission of...
8833651 Controlling connectivity of a wireless-enabled peripheral device  
A system includes a wireless-enabled peripheral device configured to be coupled to a personalized security device. The wireless-enabled peripheral device has a wireless communication interface....
8832444 Communicating an identity of a group shared secret to a server  
An identity is communicated by a client device to a server without requiring the identity to be disclosed to eavesdroppers and without requiring the use of symmetric or asymmetric cryptography. In...
8823898 Suspension and tolerance absorption subassembly for a display screen  
A display screen of an electronic device may be supported by one or more subassemblies positioned between the display screen and a printed circuit board to which the display screen is secured....
8819792 Assignment and distribution of access credentials to mobile communication devices  
A server storing a pool of unassigned access credentials selects an access credential from the pool, assigns it to an individual, identifies a mobile communication device associated with the...
8817725 Scheduling transmission of traffic treated less preferentially despite timing requirements  
A source device has a wireless communication interface. Through the wireless communication interface, the source device establishes a communication session over a wireless medium with a sink...
8792636 Protocol for protecting content protection data  
Through the use of a one-time-use nonce, the transfer of cryptographic data over a potentially insecure link in a two-factor content protection system is avoided. The nonce may be stored encrypted...
8761228 Co-existence of narrow-channel transmitter and wide-channel receiver  
A narrow-channel transmitter in a dual-radio communication device reduces its bandwidth for the benefit of a wide-channel receiver in the dual-radio communication device. Narrow channels are...
8745395 Enabling use of a certificate stored in a smart card  
If a smart card is to be used for a particular purpose, and there is no certificate initialized on the smart card for this purpose, a computerized device enables a user to select one of the...
US20140133017 Imaging Distal End of Multimode Fiber  
Where a multimode fiber is used for light delivery in a microscope system and a transverse distribution of light exiting a distal end of the fiber is substantially uniform, the distal end is...
8719431 Transient WLAN connection profiles  
A wireless local area network (WLAN) client device is able to store one or more transient connection profiles. A transient connection profile of a WLAN may be overwritten by a transient connection...
8712398 Soliciting first party in communication session to maintain call when degradation of connection to second party is anticipated  
A system and method are provided for monitoring the quality of a communication session with a first electronic device. Should the communication session degrade, rather than dropping the...
US20140104681 Spatial Filter to Combine Excitation Light and Emission Light in an Episcopic Multiplexed Confocal Scanning Microscope  
In an episcopic multiplexed confocal scanning microscope system, a spatial filter is placed at a conjugate plane to a back aperture plane at a back aperture of an objective lens. The spatial...
US20140104680 Total Internal Reflectance Fluorescence (TIRF) Microscopy Across Multiple Wavelengths Simultaneously  
A multiple wavelength total internal reflection fluoresence (TIRF) microscopy system has an objective. A dispersion unit of the system comprises a high-dispersion optical element. The dispersion...
8699963 Mobile communication device with receiver speaker  
An audio subsystem in a mobile communication device has a speaker. In one implementation, the audio subsystem has a higher-gain power amplifier, a lower-gain power amplifier, and a switching...
8699379 Configuring mobile station according to type of wireless local area network (WLAN) deployment  
A target access point is selected from the results of a discovery scan so that a mobile station can attempt a connection with the target access point. The mobile station determines whether the...
8695063 Authentication failure in a wireless local area network  
In the event of an authentication process failure, a mobile station bans a connection profile storing the credentials provided by the mobile station when initiating the failed authentication...
8693986 Secure provisioning methods and apparatus for mobile communication devices operating in wireless local area networks (WLANs)  
A method for use in enabling a mobile communication device for communication involves establishing communication with an IEEE 801.11 device which is configured to operate as an access point; while...
8693695 Systems and methods to securely generate shared keys  
A method for secure bidirectional communication between two systems is described. A first key pair and a second key pair are generated, the latter including a second public key that is generated...
8693461 Wi-Fi quality of service signaling  
The transmission of signaling frames in a QoS system may be prioritized over the transmission of content frames carrying time-sensitive information. The signaling frames and the content frames may...

Matches 51 - 100 out of 316 < 1 2 3 4 5 6 7 >
« search again