Abstract:
Various embodiments include systems and methods of determining whether a compromised access point is present in a communication network. A processor of a wireless communication device may predict one or more websites that the wireless communication device will access during a future session with the one or more websites. The processor may establish a secure connection with the communication network, request a digital certificate for one or more of the predicted websites, and store a digital certificate received from each of the predicted websites. The processor may determine whether a compromised access point is present in the communication network by comparing one of the digital certificates from the predicted websites with a digital certificate received from a website server during a current session.
Abstract:
Systems, apparatus and methods for selecting a base station or a set of base stations for RTT measurements, or other interactive radio localization technique, to determine a position fix of a device are presented. The method imposes a processing load on only inactive or less active base stations. Busy or busier base stations are not used in the interactive radio localization technique. By imposing a processing load on only less active base stations, transmitting devices may be under loaded and encounter a more uniform processing delay, and thus provide a more accurate measurement resulting in a more accurate position fix.
Abstract:
Disclosed are methods, devices, systems, apparatus, servers, computer-/processor-readable media, and other implementations, including a method, performed at a first processor-based wireless device, that includes obtaining by the first wireless device a communication comprising antenna information for one or more antennas of a second wireless device, determining at the first wireless device signal strength values for signals transmitted from the second wireless device, and performing location determination operations based on the determined signal strength values for the signals transmitted from the second wireless device, and on the antenna information for the one or more antennas of the second wireless device.
Abstract:
Disclosed are methods and apparatuses for improving location estimation. The method receives LCI updates from an LCI disambiguation engine. The method determines that a trigger threshold is reached, wherein the trigger threshold is based on proximity to a poor location estimation region. The method requests enhanced assistance data, wherein the assistance data includes at least one AP associated with a second LCI that is different than a first LCI, the first LCI being associated with a present position of the apparatus. The method receives position updates from a Position Engine using the enhanced assistance data.
Abstract:
Systems and methods of network based positioning include a server configured to assign priority levels to mobile devices locatable within the network, and allocate network resources for network based positioning of the locatable mobile devices, based on the corresponding priority levels assigned to the mobile devices. The server may further be configured to admit only a selected subset of the locatable mobile devices into the network for purposes of network based positioning and deny admission to the remaining locatable mobile devices, wherein the selected subset can be determined based on an attribute of the mobile device and/or a characteristic of the user of the mobile device.
Abstract:
Techniques for providing a user with an augmented virtuality (AV) experience are described herein. An example of a method of providing an AV experience includes determining a location of a mobile device, determining a context based on the location, obtaining AV object information, displaying the AV object information in relation to the context, detecting an interaction with the context, modifying the AV object information based on the interaction, and displaying the modified AV object information. The context may include weighting information. The weighting information may be based on Received Signal Strength Indication (RSSI) or Round-Trip Time (RTT) data. The weighting information may be associated with a composition of a physical object in the context. A user gesture may be received, and the AV object information may be modified based on the received gesture information.
Abstract:
Disclosed are systems, apparatus, devices, methods, computer program products, and other implementations, including a method that includes determining location of a device, and controlling monitoring of behavior of one or more processes executing on the device based on the determined location of the device to identify potential one or more security-risky processes from the monitored one or more executing processes. In some embodiments, controlling the monitoring of the behavior of the one or more processes may include one or more of, for example, adjusting frequency of the monitoring of the one or more processes based on the determined location of the device, adjusting level of detail obtained for the monitored behavior of the one or more processes based on the determined location of the device, and/or adjusting features being observed for the monitored one or more processes based on the determined location of the device.
Abstract:
Disclosed are systems, apparatus, devices, methods, computer program products, and other implementations, including a method that includes determining at a mobile device whether verbal input from a user is required to determine position of location of the user. The method also includes, in response to a determination that the verbal input from the user is required to determine the position of the location of the user, obtaining at the mobile device verbal description data representative of one or more geographic features viewable by the user from the location of the user, identifying at the mobile device the one or more of the geographic features from the obtained verbal description data, and determining, at the mobile device, positioning information for the location of the user based, at least in part, on the one or more geographic features identified from the verbal description data.
Abstract:
In one implementation, a method may comprise: determining a topological representation of an indoor portion of a building based, at least in part, on positions or number of lines in an image of the indoor portion of the building; and comparing the topological representation to one or more stored topological representations, for example in a digital map of the building, to determine a potential position of the indoor portion of the building.
Abstract:
Methods and devices include a server and at least two web browsers operable on at least two different computing devices. A server processes requested code to return binary code as metadata to assist a computing device render a webpage. The server transmits the generated metadata to at least one computing device. The computing device renders a webpage using at least a portion of the provided metadata. The metadata may identify portions of JavaScript that can be processed in parallel. The metadata may identify a library portion that does not have to be loaded. The metadata may identify a portion of the webpage that may be rendered first before a second portion of the webpage. Returning metadata to the computing device can assist the computing device in parsing, analyzing or executing the request for the webpage.