Abstract:
Systems and methods of limiting wireless discovery range are described. A method may include determining, at a first device, a discovery range threshold that limits a distance from the first device at which a second device is operative to decode a discovery message. The method may include adjusting a transmission attribute at the first device based on the discovery range threshold. The method may include sending the discovery message in accordance with the adjusted transmission attribute.
Abstract:
Methods and apparatuses of providing assistance data of a venue to a mobile device are disclosed. According to aspects of the present disclosure, for the same area, multiple or different versions of assistance data may be generated. Restrictions may be applied by access area, such that positioning grid, heat maps, and maps can be restricted to certain sections of the venue; and point of interests (POIs) and search features may be provided based on at least one of user credentials, time-based restrictions, ticket-based restrictions, or loyalty-based restrictions, or any combination thereof.
Abstract:
The various aspects include systems and methods for enabling mobile computing devices to recognize when they are at risk of experiencing malicious behavior in the near future given a current configuration. Thus, the various aspects enable mobile computing devices to anticipate malicious behaviors before a malicious behavior begins rather than after the malicious behavior has begun. In the various aspects, a network server may receive behavior vector information from multiple mobile computing devices and apply pattern recognition techniques to the received behavior vector information to identify malicious configurations and pathway configurations that may lead to identified malicious configurations. The network server may inform mobile computing devices of identified malicious configurations and the corresponding pathway configurations, thereby enabling mobile computing devices to anticipate and prevent malicious behavior from beginning by recognizing when they have entered a pathway configuration leading to malicious behavior.
Abstract:
Methods and devices for detecting suspicious or performance-degrading mobile device behaviors may include performing behavior monitoring and analysis operations to intelligently, dynamically, and/or adaptively determine the mobile device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the behaviors are to be observed. Such behavior monitoring and analysis operations may be performed continuously (or near continuously) in a mobile device without consuming an excessive amount of processing, memory, or energy resources of the mobile device by identifying hot application programming interfaces (APIs) and hot action patterns that are invoked or used most frequently by software applications of the mobile device and storing information regarding these hot APIs and hot action patterns separately and more efficiently.
Abstract:
Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources.
Abstract:
Disclosed is a method for position determination, including altering or generating at least one radio heatmap value in a collection of radio heatmap values, the altering or generating based, at least in part, on a measurement of one or more characteristics of wireless signals received by a receiver at a first wireless network access point and transmitted by a transmitter at a second wireless network access point; and transmitting at least a portion of the collection of radio heatmap values including the altered or generated radio heatmap value to a mobile station as positioning assistance information.
Abstract:
Certain aspects of the present disclosure provide techniques for wireless communications using two different physical layers with a common medium access control layer.