Method and apparatus for transferring data via radio frequency (RF) memory tags
First Claim
Patent Images
1. A method comprising:
- receiving a request, at a device, to grant access for interaction between a first Radio Frequency (RF) memory tag and a second RF memory tag, the first RF memory tag being associated with two or more trusted storage areas in the device that store data that respectively require two or more different levels of security or protection;
determining an accessibility state of the first RF memory tag, the one or more trusted storage, or a combination thereof; and
causing, at least in part, granting of the access based, at least in part, on the accessibility state,wherein the access is via a connection between the first RF memory tag and the second RF memory tag, andwherein the first RF memory tag is associated with the device.
3 Assignments
0 Petitions
Accused Products
Abstract
An approach is presented for transferring data via radio frequency (RF) memory tags. The UE manager receives a request, at a device, to grant access for interaction between a first RF memory tag and a second RF memory tag, the first RF memory tag associated with one or more trusted storage. Further, the UE manager determines an accessibility state of the first RF memory tag, the one or more trusted storage, or a combination thereof. Then, the UE manager causes, at least in part, granting of the access based, at least in part, on the accessibility state. The access is via a connection between the first RF memory tag and the second RF memory tag.
20 Citations
20 Claims
-
1. A method comprising:
-
receiving a request, at a device, to grant access for interaction between a first Radio Frequency (RF) memory tag and a second RF memory tag, the first RF memory tag being associated with two or more trusted storage areas in the device that store data that respectively require two or more different levels of security or protection; determining an accessibility state of the first RF memory tag, the one or more trusted storage, or a combination thereof; and causing, at least in part, granting of the access based, at least in part, on the accessibility state, wherein the access is via a connection between the first RF memory tag and the second RF memory tag, and wherein the first RF memory tag is associated with the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, receive a request, at a device, to grant access for interaction between a first RF memory tag and a second RF memory tag, the first RF memory tag associated with two or more trusted storage areas in the device that store data that respectively require two or more different levels of security or protection; determine an accessibility state of the first RF memory tag, the one or more trusted storage, or a combination thereof; and cause, at least in part, granting of the access based, at least in part, on the accessibility state, wherein the access is via a connection between the first RF memory tag and the second RF memory tag, and wherein the first RF memory tag is associated with the device. - View Dependent Claims (17, 18, 19, 20)
-
Specification