Abstract:
An identification (ID) code (204) in a memory slot (203) within a communication unit (200) is programmable only through a received RF message and a valid trigger for programming the memory slot (203). No other connection to the radio, such as a standard programming port (206), is capable of being used to program the memory slot (203). An ID code (204), such as a security ID, is programmed via an RF message. The ID code (204) is a special code known to a communication system. No request for a communication resource is granted to a communication unit (200) that does not have the ID code (204), thereby keeping unauthorized users from gaining access to the communication system.
Abstract:
A portable electronic device detects a trigger event and responds by automatically moving a component that comprises a part of the portable electronic device. Examples of trigger events include but are not limited to receiving a communication (such as a wireless communication), receiving an input from a user interface, the occurrence of a time-based event, and so forth. The movement can comprise articulation-based movement (including but not limited to pivoting, rotating, sliding, bending, telescoping, elongating, realigning, or separating, to note but a few examples in these regards). These teachings will accommodate determining a present suitability of so moving the component, and not moving the component when such movement is not suitable at a time of determining the suitability. Such a determination can precede the movement and/or can occur during the course of the movement as desired.
Abstract:
Detection of a physical interaction between a first device that is logically coupled to a second device, wherein the physical interaction comprises one of a plurality of physical interactions that involve movement of one of the first device and the second device, results in automatically performing a function that corresponds to the physical interaction. The detected physical interaction can comprise one or more of a physical reorientation of the first device, a pivoting movement between the first device and the second device, a sliding movement between the first device and the second device, and a momentary change in physical proximity of the first device with respect to the second device. This activity can also include determining whether the physical interaction occurs within a predetermined period of time, and when the physical interaction does not occur within the predetermined period of time, prohibiting the automatic performing of the function.
Abstract:
A valve lifter guide (100, 900, 1100) includes at least one conduit (101, 901, 1101). The conduit (101, 901, 1101) has a first inwardly-curved surface (103) opposed to a second inwardly-curved surface (105) such that the conduit is capable of holding a valve lifter (200) between the first inwardly-curved surface (103) and the second inwardly-curved surface (105). The valve lifter guide (100, 900, 1100) may optionally include inwardly-curved alignment surfaces 1103.
Abstract:
When it is desired to transmit important or secure information to one or more communication units, a message is transmitted (200) to only valid communication unit ID codes. The message requests an acknowledgment transmission from the communication unit, including the communication unit's ID code. When no acknowledgment is received for a particular ID code, the message is transmitted again after a period of time (204). When only one acknowledgment is received for a particular ID code, the important or secure information is then transmitted (206) to that particular ID code. When more than one acknowledgment is received for a particular ID code, no important or secure information is transmitted to that particular ID code, and the ID code is flagged (207) as a potential unauthorized ID code.
Abstract:
An electronic device detects a change in its physical configuration and automatically performs an application function in response to such detection. By one approach this can comprise detecting a change in configuration as regards a native component of the electronic device (such as, for example, whether the component is configured in a deployed position or a non-deployed position). The nature of the performed application function can vary with the application setting. As one example, this activity can comprise moving at least a portion of the application's user interface to the aforementioned component. As another example, this activity can comprise accessing preferences information (by, for example, accessing stored information that maps particular application functions to corresponding physical configurations of the electronic device).
Abstract:
Detection of a change in physical configuration of a discrete device with respect to an electronic device leads to responsively changing application functionality of the electronic device as a function, at least in part, of information provided by the discrete device. By one approach the detected change can pertain to movement of the discrete device with respect to the electronic device or orientation of a coupling of the discrete device to the electronic device. This information can comprise at least a unique identification code. In such a case these teachings will accommodate using the unique identification code to access a corresponding profile for the discrete device where the profile specifies at least one application to be presently made available using the discrete device.
Abstract:
A method includes detecting a gesture associated with an edge of a display, determining an element associated with the edge, and opening the element.
Abstract:
A method for detecting unauthorized use of a communication unit (102) in a secure wireless communication system includes monitoring (201) a wireless communication channel (103) presently supporting a secure communication. It is determined (202) whether the secure communication is encrypted with active system encryption parameters. When the secure communication is not encrypted with the active system encryption parameters, a communication unit (102) involved in the secure communication is indicated (203) as a potential unauthorized communication unit (102). The steps of monitoring, determining, and indicating are performed by a communication unit (102) or a central controller (101).
Abstract:
A method for detecting unauthorized use of a communication unit in a secure wireless communication system includes receiving, by a central controller, a service request from the communication unit via the wireless communication system. The central controller determines whether the service request is requesting an unencrypted communication resource or an encrypted communication resource. When the service request is requesting an unencrypted communication resource, the central controller determines whether the service request substantially matches a historical utilization pattern. When the service request does not substantially match the historical utilization pattern, the central controller indicates that the communication unit is a potential unauthorized communication unit.