Patent application number | Description | Published |
20090029699 | APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR PROVIDING A PERCEIVABLE PHYSICAL INDICATION OF SERVICE AVAILABILITY - An apparatus, method and computer program product are provided for directing a device to emit a perceivable physical indication (e.g., noise, light, vibration, smell, etc.), in order to indicate to a user that the device provides a particular service of interest to the user. A user may request a list of the instances of a service (e.g., printer service, audio service, display service, etc.) available within a certain area. Upon receipt of the list of instances of a particular service, the user may select respective instances one by one such that the device on which each instance is executed emits a perceivable physical indication. This physical indication enables the user to determine where the device is located and how it is situated, information which the user can use to determine which device, or instance of the service, he or she should select. | 01-29-2009 |
20110055200 | METHOD AND APPARATUS FOR UTILIZING EXISTING HASH IDENTIFIERS OF DECISION DIAGRAMS - An approach is provided for reducing decision diagram related communication traffic and cost by utilizing existing hash identifiers of decision diagrams. A hash identifier application receives a plurality of hash identifiers computed based on a respective plurality of reduced ordered binary decision diagrams constructed for resource description framework graphs. Thereafter, the hash identifier application initiates storage of the hash identifiers for use and subsequent reuse. | 03-03-2011 |
20110055221 | METHOD AND APPARATUS FOR OBTAINING DECISION DIAGRAMS FROM UNKNOWN HASH IDENTIFIERS - An approach is provided for reducing decision diagram related communication traffic and cost by querying unknown hash identifiers. A hash identifier application receives a hash identifier that is computed based on a reduced ordered binary decision diagram constructed for a resource description framework graph. The hash identifier application determines whether the received hash identifier matches a predetermined one of a plurality of hash identifiers. The hash identifier application reconstructs or queries for the decision diagram, when there is no match. | 03-03-2011 |
20110055545 | METHOD AND APPARATUS FOR ENCODING DECISION DIAGRAMS - An approach is provided for reducing decision diagram related communication traffic and cost by encoding decision diagrams. A hash identifier application constructs a reduced ordered binary decision diagram from a resource description framework graph, computes a hash identifier corresponding to the decision diagram, and stores the hash identifier with the decision diagram. | 03-03-2011 |
20110078104 | METHOD AND APPARATUS OF CONSTRAINT VERIFICATION IN DISTRIBUTED INFORMATION SPACES - An approach is provided for verification of information consistency in distributed information spaces using binary decision diagrams. A binary decision diagram construction platform constructs an augmented binary decision diagram for the information based on the logical rules defined in an ontology and transmit the diagram to the server managing information sharing. The server uses the type constraints and the cardinality constrains encoded in the diagram to verify consistency of information in information spaces. Therefore, even if the managing server has no access to the ontology, information consistency constraints can be transmitted to the server over the communication network in the form of binary decision diagrams and the information consistency can be verified locally without having to transmit the whole information space over the network to be verified in a remote location. | 03-31-2011 |
20110113138 | SEMANTICALLY ENHANCED SERVICE SWITCHING - A system for automating service switching in a manner that may be transparent to any actively communicating applications or devices operating in a modular service based system architecture for mobile and embedded devices. An application level entity, such as an application node, may connect to a virtual service, which may be connected to one or more registered services. A switching subsystem may relay communication between the one or more registered services and the application via the virtual service. If a more suitable service becomes available, the switching subsystem may decide to switch from one or more of the registered services to the newly available service via the virtual service. | 05-12-2011 |
20110206200 | METHOD AND APPARATUS FOR APPLYING RECIPIENT CRITERIA IN IDENTITY-BASED ENCRYPTION - An approach is provided for reducing communication traffic and cost by applying recipient criteria in identity-based encryption. A recipient criterion application selects one or more recipient criteria for data, and encrypts the data using the selected one or more recipient criteria as a public key of identity-based encryption. | 08-25-2011 |
20110235799 | METHOD AND APPARATUS FOR QUERYING CONTENT PROTECTED BY IDENTITY-BASED ENCRYPTION - An approach is provided for reducing communication traffic/cost and protecting content by applying recipient criteria in identity-based encryption. A criterion application of a querier causes, at least in part, transmission of a query associated with a first user described according to a first set of criteria. Based on the query, the criterion application of the querier receives one or more second sets of criteria associated with respective second users, wherein the second sets of criteria are matched, at least in part, to the first set of criteria, and wherein at least one of the second sets of criteria is used as a public key for encrypting data according to an identity-based encryption scheme. A criterion application of an information store receives the query associated with the first user, and matches one or more second sets of criteria with all or part of the first set of criteria. | 09-29-2011 |
20110238985 | METHOD AND APPARATUS FOR FACILITATING PROVISION OF CONTENT PROTECTED BY IDENTITY-BASED ENCRYPTION - An approach is provided for reducing communication traffic/cost and protecting content. A criterion application causes, at least in part, reception at a first recipient one or more first data encrypted with one or more first recipient criteria as a public key of identity-based encryption, the first data including one or more first instructions. The criterion application matches one or more second recipient criteria corresponding to the first recipient against the first recipient criteria that encrypted the first data. The criterion application decrypts with a first decryption key one or more of the first data corresponding to at least a matched one of the first recipient criteria, when one or more of the second recipient criteria match the at least one of the first recipient criteria. The criterion application executes automatically or on demand at the first recipient one or more of the first instructions included in decrypted first data. | 09-29-2011 |
20110258430 | METHOD AND APPARATUS FOR APPLYING EXECUTION CONTEXT CRITERIA FOR EXECUTION CONTEXT SHARING - An approach is provided for applying execution context criteria for secure execution context sharing. A criterion application retrieves an execution context of a device. The criterion application determines one or more context criteria associated with the execution context. The context criteria include state information associated with the execution context. The criterion application encrypts the execution context using the one or more context criteria as a public key of an identity-based encryption. | 10-20-2011 |
20110307841 | METHOD AND APPARATUS FOR BINDING USER INTERFACE ELEMENTS AND GRANULAR REFLECTIVE PROCESSING - An approach is provided for binding user interface elements and granular reflective processing. An information management infrastructure determines to detect an event, from a first device, for specifying one or more user interface elements for transfer to a second device. The information management infrastructure further identifies one or more processes bound to the user interface elements. The information management infrastructure also determines at least one of a user context, an execution context within the user context, and one or more other execution contexts for the processes, wherein the one or more other execution contexts are from at least one of the user context and one or more other user contexts. The information management infrastructure further causes, at least in part, serialization of at least one of the user context, the execution context, and the one or more other execution contexts. The information management infrastructure further determines to transmit the serialization to the second device to initiate reconstruction of the at least one of the user context, the execution context, and the one or more other execution contexts. | 12-15-2011 |
20110320516 | METHOD AND APPARATUS FOR CONSTRUCTION AND AGGREGATION OF DISTRIBUTED COMPUTATIONS - An approach is provided for construction and aggregation of distributed computations. A distributed computation construction infrastructure identifies an execution context bound to a user context at a device, the execution context corresponding to one or more processes executing at the device. The distributed computation construction infrastructure further causes, at least in part, decomposition of the execution context into one or more closure primitives and respective process states, wherein the one or more closure primitives represent computation closures of the one or more processes. The distributed computation construction infrastructure also causes, at least in part, serialization of the one or more closure primitives, the process states, or a combination thereof. The distributed computation construction infrastructure further causes, at least in part, aggregation of the one or more primitives and the respective process states to reconstruct at least a portion of the execution context based, at least in part, on consistency determination. | 12-29-2011 |
20120016662 | METHOD AND APPARATUS FOR PROCESSING BIOMETRIC INFORMATION USING DISTRIBUTED COMPUTATION - An approach is provided for providing biometric information processing using distributed computation. A biometric information processing infrastructure determines to receive an input including, at least in part, biometric information. The biometric information processing infrastructure selects one or more analyses for processing the input. The biometric information processing infrastructure also determines one or more processes associated with the one or more analyses. The biometric information processing infrastructure further determines to derive one or more computation closures from the one or more processes. The biometric information processing infrastructure determines to decompose the one or more computation closures for distribution in one or more computation spaces. | 01-19-2012 |
20120079111 | METHOD AND APPARATUS FOR PROVIDING SHARED CONNECTIVITY - An approach is provided for providing shared path connectivity among devices. A connection sharing platform determines to specify at least one group of devices, the at least one group including at least a first path to establish a network connection and a second path to establish a local connection among the devices. The connection sharing platform also determines to cause at least in part an activation of one or more of the devices to establish the network connection, wherein one or more unactivated devices share the network connection over the local connection. | 03-29-2012 |
20120137044 | METHOD AND APPARATUS FOR PROVIDING PERSISTENT COMPUTATIONS - An approach is provided for providing persistent computations. A persistent computation manager determines at least one non-volatile memory space of a device. The persistent computation manager also determines at least one other non-volatile memory space of at least one other device. The persistent computation manager further determines to form a persistent memory address space based, at least in part, on the at least one non-volatile memory space and the at least one other non-volatile memory space. | 05-31-2012 |
20120166464 | METHOD AND APPARATUS FOR PROVIDING INPUT SUGGESTIONS - An approach is provided for providing input suggestions. An input generating platform causes, at least in part, presentation of a user interface element including at least one input field. The input generating platform also determines at least one field type associated with the at least one input field. The input generating platform further identifies at least one information store, context store, or a combination thereof based, at least in part, on the at least one field type. The input generating platform also determines to migrate one or more computations for generating one or more suggestions, one or more default values, or a combination thereof for populating the at least one input field, generating the user interface element, or a combination thereof to the at least one information store, context store, or a combination thereof. | 06-28-2012 |
20120166645 | METHOD AND APPARATUS FOR LOAD BALANCING IN MULTI-LEVEL DISTRIBUTED COMPUTATIONS - An approach is provided for providing load balancing in multi-level distributed computations. A distributed computation control platform determines closure capability data associated with respective levels of a computational architecture, wherein the respective levels include, at least in part, a device level, an infrastructure level, and a cloud computing level. The distributed computation control platform also determines functional flow information of the respective levels, one or more nodes of the respective levels, or a combination thereof with respect to at least one set of one or more computation closures. The distributed computation control platform further determines to cause, at least in part, processing at least the closure capability data, the functional flow information, or a combination thereof to determine: (a) a distribution of the one or more computation closures among the respective levels, (b) the one or more nodes, or (c) a combination thereof. | 06-28-2012 |
20120166646 | METHOD AND APPARATUS FOR PROVIDING MULTI-LEVEL DISTRIBUTED COMPUTATIONS - An approach is provided for providing multi-level distributed computations. A distributed computation manager receives at least one request to migrate at least one computation closure within a computational architecture, the computational architecture comprising a plurality of architectural levels including, at least in part, a device level, an infrastructure level, and a cloud computing level. The distributed computation manager also determines to select at least one of the architectural levels based, at least in part, on a determination of whether the network infrastructure level can support the at least one computation closure. The distributed computation manager further determines to migrate the at least one computation closure to the selected at least one of the architectural levels. | 06-28-2012 |
20120198251 | METHOD AND APPARATUS FOR ENERGY OPTIMIZATION IN MULTI-LEVEL DISTRIBUTED COMPUTATIONS - An approach is provided for providing energy optimization in multi-level distributed computations. A distributed computation energy optimization platform determines energy availability information associated with at least one level of a computational architecture executing at least portion of one computation closure. The distributed computation energy optimization platform also determines energy consumption information associated with the at least portion of one computation closure. The distributed computation energy optimization platform further processes and/or facilitates a processing of the energy availability information, the energy consumption information, or a combination thereof to determine whether to migrate the at least portion of one computation closure to at least one other level of the computational architecture. | 08-02-2012 |
20120221861 | METHOD AND APPARATUS FOR PROVIDING END-TO-END SECURITY FOR DISTRIBUTED COMPUTATIONS - An approach is provided for providing end-to-end security in multi-level distributed computations. A distributed computation security platform determines one or more signatures associated with one or more computation closures of at least one functional flow. The distributed computation security platform also processes and/or facilitates a processing of the one or more signatures to generate at least one supersignature. The distributed computation security platform further determines to associate the at least one supersignature with the at least one functional flow. | 08-30-2012 |
20120249298 | METHOD AND APPARATUS FOR PROVIDING BIOMETRIC AUTHENTICATION USING DISTRIBUTED COMPUTATIONS - An approach is provided for performing biometric authentication. A determination is made of biometric data from a user equipment having an associated user. Decomposition of the biometric data is caused into one or more closure primitives that represent computation closures of one or more processes of the user equipment. The user is selectively authenticated based on the decomposition of the biometric data. | 10-04-2012 |
20120278634 | METHOD AND APPARATUS FOR SECURE ACCESS TO EXECUTION CONTEXT - An approach is provided for providing secure access to execution context. An execution security platform determines an execution context of a device, the execution context including at least in part one or more computation closures. The execution security platform also processes and/or facilitates a processing of the execution context, the one or more computation closures, or a combination thereof to cause, at least in part, decomposition of the execution context, the one or more computation closures, or a combination thereof into, at least in part, one or more context criteria and content information, The execution security platform further determines to encrypt the execution context, the one or more computation closures, the content information, or a combination thereof using the one or more context criteria as a public key of an identity-based encryption. | 11-01-2012 |
20120291096 | METHOD AND APPARATUS FOR SECURE SIGNING AND UTILIZATION OF DISTRIBUTED COMPUTATIONS - An approach is provided for providing secure signing and utilization of distributed computations. A distributed computation authentication platform causes, at least in part, a signing of one or more computation closures of at least one functional flow. The distributed computation authentication platform also processes and/or facilitates a processing of the one or more signed computation closures to cause, at least in part, a transfer of the one or more signed computation closures among one or more levels, one or more nodes, or a combination thereof, wherein an execution of the one or more signed computation closures at the one or more levels, the one or more nodes, or a combination thereof is based, at least in part, on an authentication of the signed one or more computation closure. | 11-15-2012 |
20120297441 | METHOD AND APPARATUS FOR PROVIDING END-TO-END PRIVACY FOR DISTRIBUTED COMPUTATIONS - An approach is provided for providing end-to-end privacy in multi-level distributed computations. A distributed computation privacy platform determines one or more privacy policies associated with at least one level of a computational environment. The distributed computation privacy platform also determines one or more computation closures associated with the at least one level of the computational environment. The distributed computation privacy platform further processes and/or facilitates a processing of the one or more privacy policies and the one or more computation closures to cause, at least in part, an enforcement of the one or more privacy policies. | 11-22-2012 |
20130007088 | METHOD AND APPARATUS FOR COMPUTATIONAL FLOW EXECUTION - An approach is provided for optimizing computational flow execution. A computational flow execution platform determines to cause, at least in part, a construction of at least one computational flow from one or more functional blocks, wherein the one or more functional blocks include, at least in part, one or more computational closures, one or more other functional blocks, or a combination thereof. The computational flow execution platform also processes and/or facilitates a processing of the at least one computational flow, the one or more functional blocks, or a combination thereof to cause a distribution of the one or more functional blocks among one or more entities of a computational environment. The computational flow execution platform further causes, at least in part, an execution of the at least one computational flow, the one or more functional blocks, or a combination thereof based, at least in part, on the distribution. | 01-03-2013 |
20130108040 | METHOD AND APPARATUS FOR PROVIDING IDENTITY BASED ENCRYPTION IN DISTRIBUTED COMPUTATIONS | 05-02-2013 |
20130275756 | METHOD AND APPARATUS FOR APPLYING RECIPIENT CRITERIA IN IDENTITY-BASED ENCRYPTION - An approach is provided for reducing communication traffic and cost by applying recipient criteria in identity-based encryption. A recipient criterion application selects one or more recipient criteria for data, and encrypts the data using the selected one or more recipient criteria as a public key of identity-based encryption. | 10-17-2013 |
20130281021 | METHOD AND APPARATUS FOR SWITCHING ACCESS POINTS BASED ON TOUCH SELECTION - An approach is provided for configuring one or more mobile devices to multiple access points and/or services associated with at least one structure. An access platform determines status information associated with at least one structure, wherein the at least one structure is associated with one or more access points located in one part of the at least one structure, one or more other access points located in another part of the at least one structure, or a combination thereof. The access platform then processes and/or facilitates a processing of the status information to cause, at least in part, an activation, a deactivation, or a combination thereof of the one or more access points, one or more services associated with the one or more access points, the one or more other access points, one or more other services associated with the one or more other access points, or a combination thereof. | 10-24-2013 |
20130283351 | METHOD AND APPARATUS FOR CONFIGURING SERVICES BASED ON TOUCH SELECTION - An approach is provided for configuring one or more mobile devices to one or more services associated with at least one structure based on various contexts, access criteria, and/or security levels. The access platform determines proximity information of one or more devices with respect to at least a first access point, a second access point, or a combination thereof associated with at least one structure. The access platform next processes and/or facilitates a processing of the proximity information to determine one or more roles, one or more accesses, one or more rights, or a combination thereof. The access platform then determines one or more services to make available based, at least in part, on the one or more roles, the one or more accesses, the one or more rights, or a combination thereof. | 10-24-2013 |
20140087680 | METHOD AND APPARATUS FOR ENHANCING EMERGENCY CALLING WITH MOBILE DEVICES - An approach is provided for leveraging mobile devices to enhance emergency calling. The connectivity processor determines a request to initiate at least one call from at least one device. Next, the connectivity processor determines one or more devices with connectivity to the at least one device. Then, the connectivity processor determines at least one main devices from among the at least one device and the one or more other devices to initiate the at least one call based, at least in part, on operational status information, device capability information, resource availability information, or a combination thereof. | 03-27-2014 |
20140106763 | METHOD AND APPARATUS FOR IMPROVED COGNITIVE CONNECTIVITY BASED ON GROUP DATASETS - An approach is provided for allocating radio resources based on social distance information for one or more social groups. The coexistence platform determines social distance information for at least one group of a plurality of one or more users, one or more devices associated with the one or more users, or a combination thereof. The coexistence platform causes, at least in part, at least one allocation of the one or more radio resources to the one or more devices based, at least in part, on the social distance information for the at least one group or a subset of the at least one group. The coexistence client causes an initiation of a request for at least one allocation of one or more radio resources. The coexistence client determines the one or more radio resources based, at least in part, on social distance information. | 04-17-2014 |
20140180972 | METHOD AND APPARATUS FOR PROVIDING BEHAVIORAL PATTERN GENERATION FOR MIXED REALITY OBJECTS - An approach is provided for behavioral pattern generation for mixed reality objects. A mixed reality platform determines one or more computation closures for describing one or more user behavioral patterns associated with one or more digital objects of at least one augmented reality information space. The mixed reality platform then processes and/or facilitates a processing of one or more interactions with the one or more digital objects, one or more augmented reality applications associated with the at least one augmented reality information space, or a combination thereof to cause, at least in part, a determination of (a) the one or more user behavioral patterns from the one or more interactions, (b) the data acted on by the one or more computation closures, or (c) a combination thereof. | 06-26-2014 |
20140359143 | METHOD AND APPARATUS FOR PROVIDING SHARED CONNECTIVITY - An approach is provided for providing shared path connectivity among devices. A connection sharing platform determines to specify at least one group of devices, the at least one group including at least a first path to establish a network connection and a second path to establish a local connection among the devices. The connection sharing platform also determines to cause at least in part an activation of one or more of the devices to establish the network connection, wherein one or more unactivated devices share the network connection over the local connection. | 12-04-2014 |