摘要:
The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
摘要:
The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
摘要:
Systems and methods for processing stored value card requests are disclosed herein. The method may generally comprise: distributing a stored-value card to a first merchant for distribution to a customer having an account with a specific provider, the stored-value card having an associated identifier that can be used to associate a stored value with the card, the associated stored value being redeemable with one or more providers, including the specific provider, the account having an associated account number; receiving a first request to activate the card from a first merchant terminal, the first request resulting from a card purchase transaction; receiving a redemption request from the customer, wherein the redemption request comprises the identifier; identifying the provider; and passing to the customer a provider-specific identifier representative of the stored value. Systems are disclosed for accomplishing the same.
摘要:
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
摘要:
The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
摘要:
Methods of activating a communication device are disclosed. These methods may comprise receiving at a central processor an authorization request from a merchant terminal at the merchant store to authorize activation of a communication device, the central processor being in selective communication with the merchant terminal and a communications service provider; determining at the central processor whether the communication device was validly sold from the merchant store in a purchase transaction; authorizing at the central processor activation of the communication device, responsive to a determination that the communication device was validly sold from the merchant store in a purchase transaction; informing the communications service provider that the communication device is authorized and ready for activation; receiving at the central processor an activation notification from the communications service provider; and sending an activation notification message to the communication device.
摘要:
Systems and methods of using a keycard for automating transaction requests are disclosed. Methods may comprise receiving a request for a product identification number that is associated with a product by inputting keycard information at a merchant terminal, wherein the keycard was selected from among a plurality of keycards and is associated with a specific provider and value; processing the request; transmitting a transaction confirmation; and retaining the keycard by the merchant. Systems may comprise a plurality of keycards maintained in the merchant's possession before and after automating a product request, wherein each keycard is pre-associated with a product identification number; a merchant terminal comprising an input device for inputting a product identification number from the keycard, and an output device for outputting a transaction confirmation; and a central processor configured to process a transaction request associated with the keycard and the product identification number; and deliver a transaction confirmation.
摘要:
An apparatus and method for activating and using a transaction card comprising two storage media is provided. A composite transaction card comprises a transaction portion detachably coupled to an activation portion. The transaction portion comprises a substantially planar transaction portion substrate having a machine readable transaction storage medium applied thereto. The transaction storage medium has transaction card data associated with an account stored therein. The activation portion comprises a substantially planar activation portion substrate having a machine readable activation storage medium applied thereto. The activation storage medium has activation data associated with the account stored therein.
摘要:
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
摘要:
Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card.The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.