摘要:
An apparatus including at least one vibrator motor for vibrating the apparatus; a controller connected to the at least one vibrator motor; and at least one sensor connected to the controller. The at least one sensor is configured to sense drop motion of the apparatus. The controller is configured to control the at least one vibrator motor to change orientation of the apparatus during a portion of the drop motion.
摘要:
The specification and drawings present a new apparatus and method for access control for wireless memory. A memory controller communicating with a plurality of interfaces (at least one interface comprising a radio component for wirelessly communicating with a plurality of UE) can dynamically manage an access control to the memory by the UE and/or other users through any of the interfaces based on the preconfigured rules taking into consideration the identity of the least one interface and/or the determined directionality of the UE relative to the radio component.
摘要:
A system for cryptographically authenticated communication, wherein an activation signal is sent from a communications device to a memory device (410). The memory device derives a random challenge from at least one physical property of the activation signal and sends it back to the communications device (420). A signature is computed using the received random challenge (440) and sent, together with a certificate, to the memory device (450).
摘要:
An approach is provided for managing access rights of users to information spaces using signatures stored in a memory tag. A signature manager caused reading of a memory tag to initiate a request, from a device, for an initial access to an information space. The request includes an authorization signature associated with the device. The signature manager determines a level of access to the information space by comparing the authorization signature against a lattice of signature primitives associated with the information space. The signature manager then modifies the authorization signature based on the determination and stores the modified authorization signature for validation of subsequent access to the information space by the device.
摘要:
An approach is provided for recycling information fragments in information spaces. An information management system detects a plurality of information management processes occurring in an information space. The information management processes retrieve one or more information fragments from the information space. The information management system then determines a sequence of states for each of the plurality of information management processes over a period of time and calculates a state trajectory from each of the sequence of states. The calculated state trajectories are used to predict a finite set of possible future states. The information management system uses the prediction to determine which of the one or more information fragments are recyclable and preserves the recyclable information fragments for responding to a subsequent request directed to the information space.
摘要:
A system for cryptographically authenticated communication, wherein an activation signal is sent from a communications device to a memory device (410). The memory device derives a random challenge from at least one physical property of the activation signal and sends it back to the communications device (420). A signature is computed using the received random challenge (440) and sent, together with a certificate, to the memory device (450).
摘要:
An approach is provided for recycling information fragments in information spaces. An information management system detects a plurality of information management processes occurring in an information space. The information management processes retrieve one or more information fragments from the information space. The information management system then determines a sequence of states for each of the plurality of information management processes over a period of time and calculates a state trajectory from each of the sequence of states. The calculated state trajectories are used to predict a finite set of possible future states. The information management system uses the prediction to determine which of the one or more information fragments are recyclable and preserves the recyclable information fragments for responding to a subsequent request directed to the information space.
摘要:
An approach is provided for applying privacy policies to structured data. A privacy policy management infrastructure receives a request for an exchange of structured data among a plurality of devices. The privacy policy management infrastructure determines one or more elements of the structured data. The privacy policy management infrastructure also determines one or more privacy policies corresponding to the structured data, respective ones of the one or more elements, or a combination thereof. The privacy policy management infrastructure further determines to apply the one or more privacy policies to the structured data, respective ones of the one or more elements, or a combination thereof when initiating the exchange.
摘要:
An approach is provided for providing single sign-on for computation closures. A single sign-on management platform determines to create a single sign-on computation closure in response to an initiation of a single sign-on authentication session. The single sign-on management platform also determines one or more computation entities that are to execute at least one other computation closure under the single sign-on authentication session. The single sign-on management platform further causes, at least in part, a transfer of the single sign-on computation closure to the one or more computation entities.
摘要:
An apparatus for determining data signatures in a dynamic distributed device network may include a processor. The processor may be configured to receive a first query and generate a local partial closure of the data identified by the first query. The processor may be further configured to synthesize a data signature of the local partial closure. In this regard, the data signature may be an irreducible polynomial expression and the data signature may be orthogonal to remote data signatures generated from remote partial closures. Further, the processor may be configured to store the data signature in an information store within a dynamic distributed device network. Associated methods and computer program products may also be provided.