Abstract:
Embodiments include systems and methods of detecting a rogue access point by a computing device. A processor of the computing device may determine one or more features of a purported access point. The processor may calculate delta features of the purported access point based on the determined one or more features and an access point profile. The processor may apply the calculated delta features to a machine-learning model. The processor may generate an access point classification based on the application of the calculated delta features to the machine-learning model. The processor may prevent the computing device from associating with the purported access point in response to determining that the purported access point is a rogue access point, and permit associating with the access point otherwise.
Abstract:
Methods, and computing devices implementing the methods, that enable client computing devises to work in conjunction with a server device to identify and temporarily defend against non-benign applications (e.g., malware, etc.) and other threats before a more permanent solution or defense (e.g., a patch or software upgrade) becomes available and installed on the client computing device. The server device may be configured to receive reports from the client computing devices, receive threat feeds from third-party servers (e.g., threat intelligence servers, etc.), and use information included in the received threat feed and information included in the received reports to analyze, in the server computing device, a software application that is operating on a client device in multiple passes. The server may generate threat scores (e.g., one for each pass, etc.), and the threat scores to the client computing device for use in devising a customized security response.
Abstract:
Embodiments include computing devices, apparatus, and methods implemented by the apparatus for implementing wake lock aware scheduling. The apparatus may receive a wake lock request by a wake lock profiler and acquire wake lock information of a wake lock event associated with the wake lock request. The wake lock information may include a wake lock time parameter. The apparatus may send a hint having the wake lock time parameter. The apparatus may receive the hint, determine whether ready jobs can execute during the wake lock event, and send a request for permission to schedule the ready jobs for execution during the wake lock event in response to determining that the ready jobs can execute during the wake lock event.
Abstract:
Techniques describe tagging visual data (e.g., image and/or video data) with wireless and sensor measurement information by a mobile device. Tagged visual data may be sent to a server, such as a crowdsourcing server. Techniques further describe receiving visual data from a device, wherein the visual data is tagged with information comprising source identifying information associated with an at least one signal emitting device, identifying at least one visual feature from the visual data, determining a coordinate on a map at which the visual data was acquired based on identifying the at least one visual feature from the visual data, and associating the coordinate on the map with the information associated with the at least one signal emitting device.
Abstract:
Various embodiments provide methods, devices, and non-transitory processor-readable storage media enabling network probing with a communication device based on the communication device sending a probe via a first network connection and receiving the probe via a second network connection. By leveraging a capability of a communication device to establish two network connections at the same time, various embodiments may enable a single communication device to act as both a probing client and a probing server. In this manner, various embodiments may enable standalone network probing, i.e., network probing that may not require a remote dedicated probing server to act as a probe generator or a probe sink.
Abstract:
Techniques are provided which may be implemented using various methods and/or apparatuses to allow for delay zone information to be gathered by one or more mobile stations used in route navigation, provided to one or more computing devices and processed in some manner to establish navigation information that may be of use by mobile stations involved in route navigation. For example, in certain instances navigation information may be indicative of an expected delay with regard to at least one known delay zone that may affect a user of the mobile station attempting to adhere to a route.
Abstract:
Methods and devices are described for providing localized secure navigation in conjunction with near field communication access control systems. In one potential embodiment, a mobile device such as a cell phone may communicate with a door access control point using near field communication to receive location access system information. The mobile device may then authorize download and execution of a local secure navigation module from a location access system using the location access system information for use in receiving location assistance data, based on an authentication level associated with the mobile device. Such location assistance data may be used by the local secure navigation module to provide location assistance when the mobile device is in a secure location. The location of the mobile device may then be tracked using at least the location assistance data and the communication with the door access control point.
Abstract:
In one implementation, a method may comprise: determining a topological representation of an indoor portion of a building based, at least in part, on positions or number of lines in an image of the indoor portion of the building; and comparing the topological representation to one or more stored topological representations, for example in a digital map of the building, to determine a potential position of the indoor portion of the building.
Abstract:
Disclosed is a method for malicious activity detection in a mobile station of a particular model. In the method, generic malicious behavior patterns are received from a network-based malicious behavior profiling system. Mobile-station-model-specific-behavior-analysis algorithms are generated in the mobile station based on the generic malicious behavior patterns. Mobile station operations may be observed to generate a mobile station activity observation. The mobile station activity observation may be analyzed using the mobile-station-model-specific-behavior-analysis algorithms to generate an activity analysis. Malicious activity may be detected based on the activity analysis.
Abstract:
Methods, systems, computer-readable media, and apparatuses for determining a position indicator are presented. In some embodiments, position data indicating a position of a mobile device is obtained. A position indicator is determined based on at least one region of a map. The position of the mobile device is located within the at least one region. The position indicator indicates a map-feature-dependent region of the map. The position indicator is provided.