Vodafone blackberry validating account expire
There are also instances where certain countries are on a prohibited list such that exchanging encrypted data with any enterprises in that country is not permitted. 5,781,628 only discloses disabling encryption capabilities when required and this does not take account of the more subtle cryptographic requirements which are in place in many countries. For example, the permitted cryptographic strengths or types may be identified in terms of specific permitted or prohibited algorithm names or key bit lengths.
Mobile devices such as cellular telephones and communications-enabled Personal Digital Assistants (PDAs) are now capable of running application programs in addition to exchanging voice data, and cellular telephones are frequently used as the mechanism for portable computers to connect to a network to exchange data with other computers. For example, as noted above, use of cryptographic algorithms may be permitted if the key bit length is no more than a defined maximum or it may be that only certain types of cryptographic algorithm are prohibited. The provided information may also identify other country-specific communication prohibitions or restrictions.
There are differing laws in different countries as to the strength and/or types of cryptography which are allowed, including differences between European countries, with some authorities wanting to ensure that authorised signal interception remains technically feasible. 5,781,628 does not disclose any mechanism which enables performance of a selection of cryptographic components with reference to the specific requirements of communicating application programs running on communications devices. This facilitates conformance of the mobile device's communications to different countries' cryptographic requirements.
For example, a country may permit use of the RSA cryptographic algorithm with 512 bit keys but not using a key length of 1024 bits, or a country may permit use of DES but not 3DES, or use of any cryptographic algorithms up to 128 bit key length. The country of location of a mobile computing device is determined, and then information is obtained for identifying permitted cryptographic strengths or types for the identified location country.
With thousands of applications sorted out as the most popular, newest and the highest rated, get what’s the best.
Provided are a method and a mechanism for dynamically controlling the performance of communication-related operations of a mobile device in accordance with legislative requirements of the particular location of the mobile device and the location of the computing device with which it is to communicate,...
A mobile computing device including software for dynamically controlling the operation of the device to ensure conformance to legislative requirements of the current location of the device, the software controlling the device to execute processesto respond to automatic identification of the country location of at least the mobile computing device by obtaining information for identifying permitted cryptographic components for the identified country or countries, and to dynamically select or validate selection of an operation sequence in accordance with the obtained information and in accordance with communication requirements of at least a first application program on the mobile computing device, for encrypting and decrypting data. A computing apparatus for interoperating with a mobile computing device, the computing apparatus including software for dynamically controlling the operation of the computing apparatus to ensure conformance to legislative requirements of both the location of the computing apparatus and of the current location of the mobile computing device, the software controlling the apparatus to execute processesto respond to automatic identification of the country location of the mobile computing device by obtaining information for identifying permitted cryptographic components for the identified country location of the mobile device and for identifying permitted cryptographic components for the country location of the computing apparatus, and to dynamically select or validate selection of a cryptographic component in accordance with the obtained information and in accordance with communication requirements of at least a first application program on the mobile computing device, for encrypting and decrypting data. Although this might appear inessential to the simple determination in U. The controlled operations are preferably communication-related operations such as encryption and decryption or applying of digital signatures.
The present invention relates to mobile computing and, in particular, to a mechanism enabling modification of the operation of a mobile device when it crosses a country boundary in order to maintain conformance with different countries' legislative requirements such as cryptographic restrictions or other area-specific communications requirements. In a first aspect, the invention provides a method and a mechanism that can be used to automatically switch cryptography strength and/or type when mobile computing devices cross country boundaries, or to break the mobile device's connection in a controlled way.
Experience superior internet speed while you surf you favorite sites, chat with friends on Googletalk, Yahoo & MSN messenger, download music,watch videos on You Tube, read movie reviews and get the latest news – all of this while you are on the move with your Black Berry.This is a particular problem since the mobile devices can be moved across country boundaries, such that a static solution would be inadequate. The application service component is responsive to an identification of at least the country location of the first computing device to obtain information for identifying cryptographic components which can be used in the identified country without contravening legislative restrictions.