摘要:
Various embodiments provide methods, devices, and non-transitory processor-readable storage media enabling network path probing with a communications device by sending probes via a network connection to a STUN server and receiving probe replies. The communications device may increment a counter and transmit a test probe configured to be dropped at the first access point (NAT) causing all subsequent NATs to release their IP/port mappings. The communications device may send another probe to the STUN server and receive a probe reply. The communications device may compare the first and second probe replies to determine whether the final IP addresses within the network path match. By continuously incrementing the counter and querying access points, the communications device may determine the number of access points lay along any given network path. The presence of addition or unexpected numbers of NAT Servers may indicate the presence of a rogue access point.
摘要:
Various embodiments include a honeypot system configured to trigger malicious activities by malicious applications using a behavioral analysis algorithm and dynamic resource provisioning. A method performed by a processor of a computing device, which may be a mobile computing device, may include determining whether or not a target application currently executing on the computing device is potentially malicious based, at least in part, on the analysis, predicting a triggering condition of the target application in response to determining the target application is potentially malicious, provisioning one or more resources based, at least in part, on the predicted triggering condition, monitoring activities of the target application corresponding to the provisioned one or more resources, and determining whether or not the target application is a malicious application based, at least in part, on the monitored activities. The resources may be device components (e.g., network interface(s), sensor(s), etc.) and/or data (e.g., files, etc.).
摘要:
Method and devices of detecting a malware infection of a computing device in a communication network are disclosed. A computing device may monitor outputs of temperature sensors associated with elements of the computing device. The monitored outputs of the temperature sensors may be compared to a profile of temperatures associated with normal operation of the computing device. A deviation of the monitored temperatures from the profile of temperatures associated with normal operation may be reported. The profile of temperatures associated with the normal operation of the computing device may be learned based on temperature sensor data obtained during normal operations. Learning the profile of temperatures may include monitoring outputs of temperature sensors associated with elements of the computing device during normal operation of the computing device and storing the monitored outputs as one or more profiles of temperatures associated with normal operation of the computing device.
摘要:
Methods and devices are described for optimizing display of information such as map data on a mobile device. Certain embodiments may include receiving, at a mobile device, a first and second set of placement data associated with a first and second object. The mobile device may then determine overlap between a representation of the first object and the second object in a rendering of an image comprising the representation of the first object and the second object, using a set of viewing parameters, the first set of placement data and the second set of placement data. The set of viewing parameters may be adjusted to reduce overlap between the representation of the first object and the second object in the rendering of the image. In additional embodiments, 3D enhancements to two-dimensional map objects may be added to enhance the presentation of the information.
摘要:
A gateway device may control access to content based, at least in part, on an audience that will consume the content. In relation to a request for content to be delivered to a media output device, the gateway device may obtain biometric data from one or more trait capture devices having a physical relation to the media output device. The gateway can determine the potential audience of the content and enforce content restrictions based on the audience. The content restrictions may be based on one or more content attributes about the content and one or more audience traits about the audience. The gateway may use thresholds associated with the audience trait to determine whether the content attribute is appropriate for the audience. The threshold or a combination of thresholds may provide for granular control of access to content.
摘要:
Systems, apparatus and methods for selecting a base station or a set of base stations for RTT measurements, or other interactive radio localization technique, to determine a position fix of a device are presented. The method imposes a processing load on only inactive or less active base stations. Busy or busier base stations are not used in the interactive radio localization technique. By imposing a processing load on only less active base stations, transmitting devices may be under loaded and encounter a more uniform processing delay, and thus provide a more accurate measurement resulting in a more accurate position fix.
摘要:
Various methods, apparatuses and/or articles of manufacture are provided which may be implemented for use by a mobile device to alter a scan operation. Various methods, apparatuses and/or articles of manufacture are provided which may be implemented for use by one or more electronic devices to determine one or more scan factors for use by a mobile device in altering a scan operation.
摘要:
Mobile devices or other client devices generally support applications that provide content to users. Application-related data transfer represents a significant portion of client device bandwidth usage. As client devices are frequently within the range of gateways (e.g., WiFi routers), the gateways may assist with application data transfer. Through application-sensitive and proactive data transfer strategies, the gateways may improve user experience and power consumption on the client devices. Disclosed are systems and methods for synchronizing application content between client devices and application servers through gateways.
摘要:
Various methods, apparatuses and/or articles of manufacture are provided which may be implemented for use by a mobile device to alter a scan operation. Various methods, apparatuses and/or articles of manufacture are provided which may be implemented for use by one or more electronic devices to determine one or more scan factors for use by a mobile device in altering a scan operation.
摘要:
Example methods, apparatuses, or articles of manufacture are disclosed herein that may be utilized, in whole or in part, to facilitate or support one or more operations or techniques for detecting location changes and monitoring assistance data via scanning for use in or with a mobile device. Briefly, in accordance with at least one implementation, a method may include obtaining, at a mobile device, a rough estimate of a location of the mobile device; identifying a plurality of transmitters within a signal acquisition range of the roughly estimated location; transmitting probe requests addressed to at least some of the transmitters; and selectively initiating a passive scan at a receiver of the mobile device if a number of responses to the probe requests received from the transmitters is less than a threshold number.