Abstract:
PROBLEM TO BE SOLVED: To provide contact validation and trusted contact updating in mobile wireless communications devices. SOLUTION: A method to be implemented in a wireless communication device includes: receiving contact information with a signature (456) from a source not on a trusted contact list; validating the signature (462) by comparing the signature to a reference signature stored, on the basis of the method, in a wireless communication device; and updating the trusted contact list regarding the contact information received if the signature is valid (468). In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
A method in a wireless communication device including receiving contact information with a signature from a source ( 310 ) not on a trusted contact list, validating ( 362 ) the signature by comparing the signature to an reference signature stored on the method in a wireless communication device, and updating ( 368 ) the trusted contact list regarding the contact information received if the signature is valid. In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message.
Abstract:
A method in a wireless communication device including receiving contact information with a signature from a source ( 310 ) not on a trusted contact list, validating ( 362 ) the signature by comparing the signature to an reference signature stored on the method in a wireless communication device, and updating ( 368 ) the trusted contact list regarding the contact information received if the signature is valid. In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message.
Abstract:
A method (fig. 4) in a wireless communication device including receiving contact information with a signature (456) from a source not on a trusted contact list, validating the signature (462) by comparing the signature to a reference signature stored on the method in a wireless communication device, updating the trusted contact list regarding the contact information received if the signature is valid (468). In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message.
Abstract:
A method (fig. 4) in a wireless communication device including receiving contact information with a signature (456) from a source not on a trusted contact list, validating the signature (462) by comparing the signature to a reference signature stored on the method in a wireless communication device, updating the trusted contact list regarding the contact information received if the signature is valid (468). In some applications, the contact informati on and signature is associated with a wireless communication device provisionin g session request message.
Abstract:
A method in a wireless communication device including receiving contact information with a signature from a source ( 310 ) not on a trusted contact list, validating ( 362 ) the signature by comparing the signature to an reference signature stored on the method in a wireless communication device, and updating ( 368 ) the trusted contact list regarding the contact information received if the signature is valid. In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message.
Abstract:
A method in a wireless communication device including receiving contact information with a signature from a source ( 310 ) not on a trusted contact list, validating ( 362 ) the signature by comparing the signature to an reference signature stored on the method in a wireless communication device, and updating ( 368 ) the trusted contact list regarding the contact information received if the signature is valid. In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message.
Abstract:
A method in a wireless communication device including receiving contact information with a signature from a source ( 310 ) not on a trusted contact list, validating ( 362 ) the signature by comparing the signature to an reference signature stored on the method in a wireless communication device, and updating ( 368 ) the trusted contact list regarding the contact information received if the signature is valid. In some applications, the contact information and signature is associated with a wireless communication device provisioning session request message.