Abstract:
Methods, systems, computer-readable media, and apparatuses for detection of anomalies within indoor map information are presented. In some embodiments, the method includes receiving a digital map. The method may further include identifying one or more anomalies within the digital map using a software-based anomaly detection tool. The method may also include displaying one or more suggested corrections to a user based on the one or more identified anomalies. The method may additionally include correcting the one or more identified anomalies within the digital map.
Abstract:
In one implementation, a method may comprise: storing a user profile indicative of at least one attribute of a user of a mobile station; determining a measurement value based, at least in part, on a signal from at least one sensor on the mobile station; and estimating a location of the mobile station based, at least in part, on an association of the at least one attribute and the measurement value with a context parameter map database.
Abstract:
The various aspects provide for a computing device and methods implemented by the device to ensure that an application executing on the device and seeking root access will not cause malicious behavior while after receiving root access. Before giving the application root access, the computing device may identify operations the application intends to execute while having root access, determine whether executing the operations will cause malicious behavior by simulating execution of the operations, and pre-approve those operations after determining that executing those operations will not result in malicious behavior. Further, after giving the application root access, the computing device may only allow the application to perform pre-approved operations by quickly checking the application's pending operations against the pre-approved operations before allowing the application to perform those operations. Thus, the various aspects may ensure that an application receives root access without compromising the performance or security integrity of the computing device.
Abstract:
Methods, systems and devices use operating system execution states while monitoring applications executing on a mobile device to perform comprehensive behavioral monitoring and analysis include configuring a mobile device to monitor an activity of a software application, generate a shadow feature value that identifies an operating system execution state of the software application during that activity, generate a behavior vector that associates the monitored activity with the shadow feature value, and determine whether the activity is malicious or benign based on the generated behavior vector, shadow feature value and/or operating system execution states. The mobile device may also be configured to intelligently determine whether the operating system execution state of a software application is relevant to determining whether any of the monitored mobile device behaviors are malicious or suspicious, and monitor only the operating system execution states of the software applications for which such determinations are relevant.
Abstract:
Example methods, apparatuses, or articles of manufacture are disclosed herein that may be utilized, in whole or in part, to facilitate or support one or more operations or techniques for detecting location changes and monitoring assistance data via scanning for use in or with a mobile device. Briefly, in accordance with at least one implementation, a method may include obtaining, at a mobile device, a rough estimate of a location of the mobile device; identifying a plurality of transmitters within a signal acquisition range of the roughly estimated location; transmitting probe requests addressed to at least some of the transmitters; and selectively initiating a passive scan at a receiver of the mobile device if a number of responses to the probe requests received from the transmitters is less than a threshold number.
Abstract:
Embodiments include using a wireless access point (AP) as a landmark to aid precise wireless indoor positioning of a mobile device. The AP transmits a wireless indoor positioning signal with a predetermined or known frequency and power that is typically only able to be detected and decoded by any of various types of mobile devices that are within a predetermined “close” range of the AP. Based on positioning the mobile device within the predetermined range, the device may calibrate one or more physical sensors of the mobile device for indoor positioning. Such wireless landmarks provide more accurate, efficient, automated and reliable wireless indoor positioning and sensor calibration.
Abstract:
Various methods, apparatuses and/or articles of manufacture are provided which may be implemented for use by a mobile device to alter a scan operation. Various methods, apparatuses and/or articles of manufacture are provided which may be implemented for use by one or more electronic devices to determine one or more scan factors for use by a mobile device in altering a scan operation.
Abstract:
A method and apparatus for broadcasting short interframe space information to aid in determining a round trip time are provided. The round trip time is used as an aid in locating nodes within a WiFi or WLAN network. The method begins with capturing a time of transmission of a frame by a transmitting station. The receiving station then captures the time of arrival of the frame just sent by the transmitting station. The receiving station replies with a received frame message and the time of departure is captured. The transmitting station then captures the time of arrival of the received frame message. The captured arrival and departure times of the frame and the received frame message allow the round trip time to be computed. The RTT may then be included as part of a network message.
Abstract:
An example method for determining a processing time for wirelessly determining a position of a mobile station includes: measuring a round trip time delay to each of multiple wireless access points; estimating an initial processing time for each of the wireless access points; calculating the position of the mobile station based upon the measured round trip time delays and estimated processing times; and updating the initial processing time for each of the wireless access points based upon the calculated position of the mobile station.
Abstract:
The subject matter disclosed herein relates to utilizing location information, such as maps, in location determination based on Received Signal Strength Indication (RSSI) and Round-Trip Time (RTT) data. Weighting information can be determined from and/or provided in the location information. The weighting information associated with an area in which a mobile device is located can impact how RSSI and RTT data is weighted in a calculation of the mobile device's location.