Abstract:
Techniques are provided which may be implemented using various methods, apparatuses and/or articles of manufacture to provide or otherwise support mobile device positioning. The mobile device positioning may be based, at least in part, on one or more perceived routability constraints that may or may not affect actual movement of a mobile device within an indoor environment.
Abstract:
Disclosed are systems, methods, and devices for aligning a path of movement of a mobile device with an indoor routing graph. In one particular embodiment, a mobile device may trace a path of movement from a starting point to a point of intersection with a routing graph that defines feasible movement within an area. Responsive to a detecting a point of intersection, a mobile device may estimate a contiguous route from one or more locations of the routing graph to a starting point.
Abstract:
In one implementation, a method may comprise: determining a topological representation of an indoor portion of a building based, at least in part, on positions or number of lines in an image of the indoor portion of the building; and comparing the topological representation to one or more stored topological representations, for example in a digital map of the building, to determine a potential position of the indoor portion of the building.
Abstract:
A method and apparatus for broadcasting short interframe space information to aid in determining a round trip time are provided. The round trip time is used as an aid in locating nodes within a WiFi or WLAN network. The method begins with capturing a time of transmission of a frame by a transmitting station. The receiving station then captures the time of arrival of the frame just sent by the transmitting station. The receiving station replies with a received frame message and the time of departure is captured. The transmitting station then captures the time of arrival of the received frame message. The captured arrival and departure times of the frame and the received frame message allow the round trip time to be computed. The RTT may then be included as part of a network message.
Abstract:
Methods, apparatus, and computer program products for determining a mobile device location. An example of a method for determining a mobile device location includes receiving signals from a transmitter, measuring signal characteristics of the received signals, and downloading data from a database corresponding to a defined region associated with the transmitters. The downloaded data includes a set of position points, a classification of each position point, and expected signal characteristics for each position point. The method further includes comparing the measured signal characteristics with the expected signal characteristics for each position point, assigning a weight to position points based on the compared signal characteristics, and determining the mobile device location by selecting one position point from the set as a position point solution corresponding to the mobile device location based on the assigned weight. The position point solution is constrained by the classification of each position point.
Abstract:
A computer-implemented method for converting a raster image map to a vector image map includes receiving an electronic raster image that shows an indoor map of a building structure. The method also includes determining whether the indoor map is a line map. If not, the indoor map is converted into a line map. Next, the electronic raster image is processed to generate a processed raster image of the indoor map. The method then extracts vector lines from the processed raster image to generate an electronic vector image that includes the indoor map of the building structure.
Abstract:
Various embodiments may include methods executed by processors of computing devices for geometry based work execution prioritization. The processor may receive events, such as images. The processor may overlay a boundary shape on the event to identify discard regions of the event lying outside the boundary shape. The processor may identify work regions of the events lying within the working boundary shape. The devices may determine a cancellation likelihood for each of the identified work regions of the events. The processor may assign a trimming weight to each of the identified work regions based on the determined cancellation likelihoods. The processor may then add each of the identified work regions as a work item to an execution work list in an order based on the assigned trimming weights. The work items may be processed in order of trimming weight priority.
Abstract:
Implementations include systems and methods for managing security for a mobile communication device. In implementations, a processor of the mobile communication device may determine environment context information. The processor may receive safety information from one or more peer devices. The processor may determine an authentication requirement for the mobile communication device based on the received safety information and the determined environment context information. The processor may deny access to a function of the mobile communication device in response to determining that the determined authentication requirement is not satisfied.
Abstract:
Various embodiments include methods for protecting a web application server from non-benign web application usage. Embodiment methods may include receiving from a client device a service request message that includes information suitable for causing a web application operating on the web application server to perform one or more operations. In response, a processor, such as within the web application server or another network device, may analyze usage of the web application by the client device via a combination of a honeypot component, a sandboxed detonator component, and a Web Application Firewall (WAF) component. Analysis results may be generated by analyzing the received service request message or a server response message sent by the web application server. The analysis results may be used to identify non-benign web application usage. Actions may be taken to protect the web application server and/or the client device from the identified non-benign web application usage.
Abstract:
Disclosed are devices, methods and storage media for use in determining position information for imaging devices or mobile devices. In some implementations, a landmark is identified in an image which is obtained from an imaging device which in turn is positioned at a location and in a pose. A virtual two-dimensional image that would be visible from the landmark is determined based, at least in part, on the pose. The location or position information is based, at least in part, on the virtual two-dimensional image.