摘要:
An approach is presented for performing a multi-role communication using a Radio Frequency (RF) memory tag. The control manager receives a content request, at a memory tag, from a first device according to a first access policy. Further, the control manager determines one or more sources of content data responsive to the content request. Then, the control manager provides access from the one or more sources to the memory tag according to a second access policy. The access facilitates transmission of the content data to the first device according to a third access policy.
摘要:
An approach is presented for performing a multi-role communication using a Radio Frequency (RF) memory tag. The control manager receives a content request, at a memory tag, from a first device according to a first access policy. Further, the control manager determines one or more sources of content data responsive to the content request. Then, the control manager provides access from the one or more sources to the memory tag according to a second access policy. The access facilitates transmission of the content data to the first device according to a third access policy.
摘要:
An approach is presented for transferring data via radio frequency (RF) memory tags. The UE manager receives a request, at a device, to grant access for interaction between a first RF memory tag and a second RF memory tag, the first RF memory tag associated with one or more trusted storage. Further, the UE manager determines an accessibility state of the first RF memory tag, the one or more trusted storage, or a combination thereof. Then, the UE manager causes, at least in part, granting of the access based, at least in part, on the accessibility state. The access is via a connection between the first RF memory tag and the second RF memory tag
摘要:
An approach is presented for transferring data via radio frequency (RF) memory tags. The UE manager receives a request, at a device, to grant access for interaction between a first RF memory tag and a second RF memory tag, the first RF memory tag associated with one or more trusted storage. Further, the UE manager determines an accessibility state of the first RF memory tag, the one or more trusted storage, or a combination thereof. Then, the UE manager causes, at least in part, granting of the access based, at least in part, on the accessibility state. The access is via a connection between the first RF memory tag and the second RF memory tag.
摘要:
In accordance with an example embodiment of the present invention, mobile device comprises a battery, a short-range wireless communication (SRW) chip set, a secure element incorporated into the battery, and a bootloader, wherein the SRW chip set is configured to sense proximity to a point of sales terminal and, in response, initiate bootup of the mobile device, and wherein the bootloader is configured to determine that bootup was initiated by the SRW chip set and, in response, power up only the SRW chip set and the secure element.
摘要:
In accordance with an example embodiment of the present invention, mobile device comprises a battery, a short-range wireless communication (SRW) chip set, a secure element incorporated into the battery, and a bootloader, wherein the SRW chip set is configured to sense proximity to a point of sales terminal and, in response, initiate bootup of the mobile device, and wherein the bootloader is configured to determine that bootup was initiated by the SRW chip set and, in response, power up only the SRW chip set and the secure element.
摘要:
An approach is provided for memory tag-based payment methods. A transaction management platform receives a payment request via a radio frequency memory tag associated with a device. The transaction management platform also processes and/or facilitates a processing of the payment request to determine whether the radio frequency memory tag includes a value that is sufficient to complete the payment request. On a determination that the value is not sufficient, the transaction management platform further causes, at least in part, one or more actions that result in the device initiating a transfer of additional value to the radio frequency memory tag to complete the payment request.
摘要:
An approach is provided for providing information authentication from external sensors to secure environments. An authentication support platform causes, at least in part, a generation of at least one cryptographic key for use by (a) at least one secure environment, (b) one or more sensors that are associated with at least one device and that are external to the at least one secure environment, or (c) a combination thereof. The authentication support platform further causes, at least in part, an authentication of sensor information transmitted by the one or more sensors to the at least one secure environment based, at least in part, on the cryptographic key.