Abstract:
Techniques are presented herein to coordinate ranging exchanges between base stations in order to enable any number of wireless devices in the vicinity of the base stations to obtain signals associated with ranging exchanges between base stations, time-of-departure report messages transmitted by the base stations to each other and time-of-arrival report messages transmitted by the base stations to each other, for use in computing the location of the wireless devices. Based on the multi-channel time-of-arrivals computed for the wireless device with respect to each base station, the multi-channel time-of-arrivals contained in the time-of-arrival report messages transmitted between base stations and the known locations of the base stations, a physical location is computed for the wireless device.
Abstract:
Wireless transmissions from beacon devices are received at a plurality of receiver devices. The wireless transmissions comprise packets that carry information used for location-based services for mobile wireless devices. Content of one or more fields of the beacon packets received by one or more of the plurality of receiver devices is obtained. Measurement data associated with the transmissions received at the plurality of receiver devices is generated. Locations of the respective beacon devices are computed from the measurement data obtained by the plurality of receiver devices. Information identifying detected beacon devices and their locations are stored to maintain a location history of beacon devices over time locations. Changes from information contained in the location history are detected based on the locations computed for respective beacon devices from the measurement data and content of one or more fields of detected beacon packets.
Abstract:
Techniques are presented for detecting rogue wireless beacon devices. Wireless transmissions from beacon devices are received at a plurality of receiver devices. The wireless transmissions of the beacon devices comprise packets that carry information used for location-based services for mobile wireless devices. Content of one or more fields of the packets transmitted by the beacon devices and received by one or more of the receiver devices is obtained. The content of one or more fields of the packets is analyzed to detect an unauthorized beacon device. The analyzing operation may involve comparing the content of the one or more fields of the packets against a list that contains one or more identifiers for authorized beacon devices. In another form, analyzing may involve analyzing the content of the one or more fields of the packets with pattern information related to advertising content or advertising source.
Abstract:
Dynamic bandwidth selection techniques are provided for a plurality of wireless access point devices that operate in a wireless local area network. Each access point device is capable of serving wireless client devices with a bandwidth from a set of possible bandwidths associated with one or multiple contiguous or non-contiguous radio frequency channels. A bias is generated based on determined type of traffic or client composition for each access point device, the bias favoring a channel assignment that results in a particular bandwidth in the set of bandwidths. The bias is applied to metrics representing severity and degree of interference for each channel to generate adjusted metrics. A bandwidth from the set of possible bandwidths is selected for each access point device based on the adjusted metrics.