Abstract:
The subject matter disclosed herein relates to a system and method for identification of points of interest within a predefined area. Location estimates for substantially stationary mobile devices may be utilized to determine locations of one or more points of interest. Location estimates for mobile devices in motion may be utilized to determine locations of one or more corridors.
Abstract:
Methods and systems for classifying mobile device behavior include configuring a server use a large corpus of mobile device behaviors to generate a full classifier model that includes a finite state machine suitable for conversion into boosted decision stumps and/or which describes all or many of the features relevant to determining whether a mobile device behavior is benign or contributing to the mobile device's degradation over time. A mobile device may receive the full classifier model and use the model to generate a full set of boosted decision stumps from which a more focused or lean classifier model is generated by culling the full set to a subset suitable for efficiently determining whether mobile device behavior are benign. Boosted decision stumps may be culled by selecting all boosted decision stumps that depend upon a limited set of test conditions.
Abstract:
The various aspects provide a mobile device and methods implemented on the mobile device for modifying behavior models to account for device-specific or device-state-specific features. In the various aspects, a behavior analyzer module may leverage a full feature set of behavior models (i.e. a large classifier model) received from a network server to create lean classifier models for use in monitoring for malicious behavior on the mobile device, and the behavior analyzer module may dynamically modify these lean classifier models to include features specific to the mobile device and/or the mobile device's current configuration. Thus, the various aspects may enhance overall security for a particular mobile device by taking the mobile device and its current configuration into account and may improve overall performance by monitoring only features that are relevant to the mobile device.
Abstract:
The subject matter disclosed herein relates to systems, methods, apparatuses, articles, etc. for mobile device locating in conjunction with localized environments. For certain example implementations, a method may comprise obtaining at a mobile device one or more signals comprising information indicative of a location thereof. The information may be transmitted to one or more servers. A location context identifier (LCI) may be received responsive to the transmitting, with the LCI corresponding to a localized environment at which the mobile device is located. The LCI may be transmitted to the one or more servers. Location-based data may be received responsive to the transmitting of the LCI, with the location-based data being associated with the LCI and pertaining to the localized environment. The location of the mobile device may be determined with respect to the localized environment based, at least in part, on the location-based data. Other example implementations are described herein.
Abstract:
Methods, systems and devices for classifying mobile device behaviors of a first mobile device may include the first mobile device monitoring mobile device behaviors to generate a behavior vector, and applying the behavior vector to a first classifier model to obtain a first determination of whether a mobile device behavior is benign or not benign. The first mobile device may also send the behavior vector to a second mobile device, which may receive and apply the behavior vector to a second classifier model to obtain a second determination of whether the mobile device behavior is benign or not benign. The second mobile device may send the second determination to the first mobile device, which may receive the second determination, collate the first determination and the second determination to generate collated results, and determine whether the mobile device behavior is benign or not benign based on the collated results.
Abstract:
Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. Various aspects may correct suspicious or performance-degrading mobile device behaviors. Various aspects may prevent identified suspicious or performance-degrading mobile device behaviors from degrading the performance and power utilization levels of a mobile device over time. Various aspects may restore an aging mobile device to its original performance and power utilization levels.
Abstract:
The subject matter disclosed herein relates to systems, methods, apparatuses, devices, articles, and means for updating radio models. For certain example implementations, a method for one or more server devices may comprise receiving at one or more communication interfaces at least one measurement that corresponds to a position of a first mobile device within an indoor environment. At least one radio model that is stored in one or more memories may be updated based, at least in part, on the at least one measurement to produce at least one updated radio model. The at least one radio model and the at least one updated radio model may correspond to the indoor environment. The at least one updated radio model may be transmitted to enable a second mobile device to use the at least one updated radio model for positioning within the indoor environment. Other example implementations are described herein.
Abstract:
Confusion resulting from assigning the same node identifier to multiple nodes is resolved through the use of confusion detection techniques and the use of unique identifiers for the nodes. In some aspects an access point and/or an access terminal may perform operations relating to detecting confusion and/or providing a unique identifier to resolve confusion.
Abstract:
Various embodiments include methods, and computing devices implementing the methods, for authenticating vehicle information by polling selected sensors. A server computing device receiving vehicle information from a reporting vehicle may compare the received vehicle information to contextual information to generate a comparison result, and determine whether the received vehicle information should be evaluated with greater scrutiny based on the comparison result. The server computing device may select sensors for polling based on the received vehicle information (and in response to determining that the received vehicle information should be evaluated with greater scrutiny), and poll the selected sensors to received sensor information. The server computing device may use the received sensor information to corroborate the received vehicle information, and perform a responsive action based on the result of the corroboration.
Abstract:
The various aspects provide a method for recognizing and preventing malicious behavior on a mobile computing device before it occurs by monitoring and modifying instructions pending in the mobile computing device's hardware pipeline (i.e., queued instructions). In the various aspects, a mobile computing device may preemptively determine whether executing a set of queued instructions will result in a malicious configuration given the mobile computing device's current configuration. When the mobile computing device determines that executing the queued instructions will result in a malicious configuration, the mobile computing device may stop execution of the queued instructions or take other actions to preempt the malicious behavior before the queued instructions are executed.