Abstract:
A method and system for sharing indoor location information with one or more application program modules within a portable computing device (“PCD”) includes receiving an indoor location data request and determining if a location service is currently being executed by the PCD. If the location service is not being executed, it is determined if a location engine of the PCD has been installed. If the location engine of the portable computing device has not been installed, then the code for the location engine is downloaded from a communications network. Next, the location service may be executed once the location engine has been installed. It is determined if the indoor location data being requested is present in a memory element of the PCD. If the indoor location data being requested is not present in the memory element of the PCD, then the indoor location data is downloaded from the communications network.
Abstract:
The various aspects include methods, systems, and devices configured to make use of caching techniques and behavior signature caches to improve processor performance and/or reduce the amount of power consumed by the computing device by reducing analyzer latency. The signature caching system may be configured to adapt to rapid and frequent changes in behavioral specifications and models and provide a multi-fold improvement in the scalability of behavioral analysis operations performed on the mobile device.
Abstract:
Aspect methods, systems and devices may be configured to create/capture checkpoints without significantly impacting the performance, power consumption, or responsiveness of the mobile device. An observer module of the mobile device may instrument or coordinate various application programming interfaces (APIs) at various levels of the mobile device system and constantly monitor the mobile device (via a low power process, background processes, etc.) to identify the normal operation patterns of the mobile device and/or to identify behaviors that are not consistent with previously computed normal operation patterns. The mobile device may store mobile device state information in a memory as a stored checkpoint when it determines that the mobile device behaviors are consistent with normal operation patterns, and upload a previously stored checkpoint to a backup storage system when it determines that the mobile device behaviors are not consistent with normal operation patterns.
Abstract:
The various aspects include methods, systems, and devices configured to make use of caching techniques and behavior signature caches to improve processor performance and/or reduce the amount of power consumed by the computing device by reducing analyzer latency. The signature caching system may be configured to adapt to rapid and frequent changes in behavioral specifications and models and provide a multi-fold improvement in the scalability of behavioral analysis operations performed on the mobile device.
Abstract:
Aspect methods, systems and devices may be configured to create/capture checkpoints without significantly impacting the performance, power consumption, or responsiveness of the mobile device. An observer module of the mobile device may instrument or coordinate various application programming interfaces (APIs) at various levels of the mobile device system and constantly monitor the mobile device (via a low power process, background processes, etc.) to identify the normal operation patterns of the mobile device and/or to identify behaviors that are not consistent with previously computed normal operation patterns. The mobile device may store mobile device state information in a memory as a stored checkpoint when it determines that the mobile device behaviors are consistent with normal operation patterns, and upload a previously stored checkpoint to a backup storage system when it determines that the mobile device behaviors are not consistent with normal operation patterns.
Abstract:
Various methods, apparatuses, devices, and articles of manufacture are provided for use by one or more electronic devices to provide or otherwise identify applications for potential use by a mobile device with respect to a particular environment. For example, a computing device may apply a context-aware filter to identify a list of applications for potential use by a mobile device; and, in response to a first event proffer one or more applications for use by the mobile device; and, in response to a second event withdraw the application for use by the mobile device. In another example, a mobile device may, in response to a first indication that an application has been proffered for use, initiate activation of the application; and, in response to a second indication that the application has been withdrawn for use, initiate deactivation of the application.
Abstract:
Various methods, apparatuses, devices, and articles of manufacture are provided for use by one or more electronic devices to provide or otherwise identify applications for potential use by a mobile device with respect to a particular environment. For example, a computing device may apply a context-aware filter to identify a list of applications for potential use by a mobile device; and, in response to a first event proffer one or more applications for use by the mobile device; and, in response to a second event withdraw the application for use by the mobile device. In another example, a mobile device may, in response to a first indication that an application has been proffered for use, initiate activation of the application; and, in response to a second indication that the application has been withdrawn for use, initiate deactivation of the application.