Abstract:
Various embodiments include methods of evaluating device behaviors in a computing device and enabling white listing of particular behaviors. Various embodiments may include monitoring activities of a software application operating on the computing device, and generating a behavior vector information structure that characterizes a first monitored activity of the software application. The behavior vector information structure may be applied to a machine learning classifier model to generate analysis results. The analysis results may be used to classify the first monitored activity of the software application as one of benign, suspicious, and non-benign. A prompt may be displayed to the user that requests that the user select whether to whitelist the software application in response to classifying the first monitored activity of the software application as suspicious or non-benign. The first monitored activity may be added to a whitelist of device behaviors in response to receiving a user input.
Abstract:
Methods and systems for classifying mobile device behavior include generating a full classifier model that includes a finite state machine suitable for conversion into boosted decision stumps and/or which describes all or many of the features relevant to determining whether a mobile device behavior is benign or contributing to the mobile device's degradation over time. A mobile device may receive the full classifier model along with sigmoid parameters and use the model to generate a full set of boosted decision stumps from which a more focused or lean classifier model is generated by culling the full set to a subset suitable for efficiently determining whether mobile device behavior are benign. Results of applying the focused or lean classifier model may be normalized using a sigmoid function, with the resulting normalized result used to determine whether the behavior is benign or non-benign.
Abstract:
Implementations include systems and methods for managing security for a mobile communication device. In implementations, a processor of the mobile communication device may determine environment context information. The processor may receive safety information from one or more peer devices. The processor may determine an authentication requirement for the mobile communication device based on the received safety information and the determined environment context information. The processor may deny access to a function of the mobile communication device in response to determining that the determined authentication requirement is not satisfied.
Abstract:
Embodiments provide methods of managing network traffic flows. A processor of a network device may receive a first network traffic flow of a monitoring computing device and information identifying a source application of the first network traffic flow. The processor may determine a characteristic of the first network traffic flow associated with the application based at least in part on information in the first network traffic flow and the identified source application. The processor may receive a second network traffic flow from a non-monitoring computing device, and may associate the source application and the second network traffic flow if one or more characteristics of the second network traffic flow match or correlating to one or more characteristics of network traffic resulting from the source application.
Abstract:
Various techniques are provided which may be implemented as methods, apparatuses and articles of manufacture for use by a mobile device or one or more computing devices to provide for or otherwise support motion state based mobile device positioning. In an example, a method may be implemented at a mobile device to identify two or more subsets of grid points corresponding to an electronic map representing a particular environment, select one of the two or more subsets of grid points for use in position estimation based, at least in part, on a motion state of the mobile device, and determine an estimated position of the mobile device based, at least in part, on the selected subset of grid points.
Abstract:
Systems, apparatus and methods disclosed herein facilitate vision based mobile device location determination. In some embodiments, a method for estimating a position of a mobile device may comprise: detecting that the mobile device is in communication with at least one of a plurality of devices, where each of the plurality of devices associated with a corresponding device identifier. The capture of at least one image by an image sensor coupled to the mobile device may be triggered, based, in part on: the device identifier corresponding to the device in communication with the mobile device, and/or a field of view of the image sensor. A location of the mobile device may then be determined, based, in part, on the at least one captured image.
Abstract:
A computing device processor may be configured with processor-executable instructions to implement methods of detecting and responding non-benign behaviors of the computing device. The processor may be configured to monitor device behaviors to collect behavior information, generate a behavior vector information structure based on the collected behavior information, apply the behavior vector information structure to a classifier model to generate analysis results, use the analysis results to classify a behavior of the device, use the analysis results to determine the features evaluated by the classifier model that contributed most to the classification of the behavior, and select the top “n” (e.g., 3) features that contributed most to the classification of the behavior. The computing device may display the selected features on an electronic display of the computing device.
Abstract:
Methods, systems, computer-readable media, and apparatuses for determining a position indicator are presented. In some embodiments, position data indicating a position of a mobile device is obtained. A position indicator is determined based on at least one region of a map. The position of the mobile device is located within the at least one region. The position indicator indicates a map-feature-dependent region of the map. The position indicator is provided.
Abstract:
Methods and systems for classifying mobile device behavior include generating a full classifier model that includes a finite state machine suitable for conversion into boosted decision stumps and/or which describes all or many of the features relevant to determining whether a mobile device behavior is benign or contributing to the mobile device's degradation over time. A mobile device may receive the full classifier model along with sigmoid parameters and use the model to generate a full set of boosted decision stumps from which a more focused or lean classifier model is generated by culling the full set to a subset suitable for efficiently determining whether mobile device behavior are benign. Results of applying the focused or lean classifier model may be normalized using a sigmoid function, with the resulting normalized result used to determine whether the behavior is benign or non-benign.
Abstract:
Systems, apparatus and methods for deriving a heatmap in a server are presented. A heatmap is formed from sensor measurements and/or wireless signal strength measurements that have been grouped. Sensor measurements are paired or group into complementary sets thereby reducing sensor bias and/or system bias that is otherwise included because of sensor drift and unbalanced directional travel. Similarly, wireless signal strength measurements are paired or group into complementary sets also reducing system bias.