Abstract:
In an aspect, an apparatus obtains a first payload that is dynamically loaded by an application program of the apparatus. For example, the first payload may be dynamically loaded by an application program (e.g., during run time) for execution on the apparatus. The apparatus determines whether the first payload includes malicious content. The apparatus prevents execution of the first payload when the first payload includes the malicious content, and executes the first payload when the first payload does not include the malicious content.
Abstract:
Methods, systems, computer-readable media, and apparatuses for integration of an outdoor map and an indoor map associated with a venue using a mobile device are presented. The method may comprise presenting the outdoor map associated with an outdoor map application, wherein the outdoor map includes an area associated with the venue. Additionally, the method may comprise overlaying the indoor map on the area of the outdoor map associated with the venue, wherein the indoor map is associated with an indoor map application. Furthermore, the method may comprise receiving a first indication of a first event associated with the venue. Moreover, in response to receiving the first indication of the first event, the method may comprise allowing the indoor map application to control an aspect associated with the presentation of the outdoor map with the overlaid indoor map.
Abstract:
Methods and systems for providing information associated with a location history of a mobile device to one or more applications are disclosed. A mobile device generates one or more location history records based on one or more locations of the mobile device, each location history record comprising one or more points of interest and a duration at the one or more points of interest, receives an information request from at least one application, determines a subset of the one or more location history records that meet criteria from the information request, determines a level of permission for the at least one application based on the information request and the subset of the one or more location history records, and provides information associated with the subset of the one or more location history records to the at least one application based on the level of permission.
Abstract:
The subject matter disclosed herein relates to systems, methods, apparatuses, articles, etc. for mobile device locating in conjunction with localized environments. For certain example implementations, a method may comprise obtaining at a mobile device one or more signals comprising information indicative of a location thereof. The information may be transmitted to one or more servers. A location context identifier (LCI) may be received responsive to the transmitting, with the LCI corresponding to a localized environment at which the mobile device is located. The LCI may be transmitted to the one or more servers. Location-based data may be received responsive to the transmitting of the LCI, with the location-based data being associated with the LCI and pertaining to the localized environment. The location of the mobile device may be determined with respect to the localized environment based, at least in part, on the location-based data. Other example implementations are described herein.
Abstract:
Methods, apparatuses, and non-transitory processor-readable media of the present disclosure are presented for efficiently executing applications based on pressure sensor data. In some embodiments, a method includes monitoring pressure, and determining a rate of change in the pressure over time exceeds a predetermined rate-of-pressure-change threshold. The method further includes subsequently determining that the rate of change in the pressure over time no longer exceeds the predetermined rate-of-pressure-change threshold. The method further includes determining a change in pressure has exceeded a predetermined pressure-change threshold, and performing floor disambiguation.
Abstract:
Methods, systems, computer-readable media, and apparatuses selecting access points and generating assistance data for access points is provided. In one embodiment a plurality of access points in a first area are identified, a location assistance quality value with each access point of the plurality of access points is associated with each access point, and a subset of the plurality of access points is selected based on the location assistance quality value of each access point of the plurality of access points. Assistance data is then generated for the selected access points.
Abstract:
Techniques for determining a position of a mobile device in an indoor environment are provided. An example method includes receiving a request for the position of the mobile device within the indoor environment from an application running on the mobile device, estimating the position of the mobile device within the indoor environment based on signals received from a plurality of wireless access points responsive to receiving the request for the position of the mobile device, identifying an ambiguity in estimating the position of the mobile device, identifying disambiguation information for resolving the ambiguity in the position, requesting disambiguation information for resolving the ambiguity associated with the position, receiving the disambiguation information for resolving the ambiguity associated with the position; resolving the ambiguity in estimating the position using the disambiguation information; and determining the position of the mobile device in the indoor environment.
Abstract:
Disclosed is a method for malicious activity detection in a mobile station of a particular model. In the method, generic malicious behavior patterns are received from a network-based malicious behavior profiling system. Mobile-station-model-specific-behavior-analysis algorithms are generated in the mobile station based on the generic malicious behavior patterns. Mobile station operations may be observed to generate a mobile station activity observation. The mobile station activity observation may be analyzed using the mobile-station-model-specific-behavior-analysis algorithms to generate an activity analysis. Malicious activity may be detected based on the activity analysis.
Abstract:
Disclosed are implementations, including a method, performed at a processor-based mobile device, that includes receiving at the mobile device antenna information for a wireless node, including a transmitter gain for the wireless node in at least one message transmitted to the mobile device. The at least one message includes, a beacon frame message, a fine timing measurement (FTM) protocol-based message, and/or an assistance data message transmitted from a remote central repository. The method also includes deriving an estimate of a receiver gain for a receiver of the mobile device based, at least in part, on the transmitter gain for the wireless node, and adjusting one or more signal strength values determined for signals received from the wireless node based on the estimate of the receiver gain of the receiver of the mobile device derived based, at least in part, on the transmitter gain for the wireless node.
Abstract:
Disclosed are methods, devices, systems, apparatus, servers, computer-/processor-readable media, and other implementations, including a method, performed at a processor-based wireless mobile device, that includes receiving, by the mobile device, signals that include at least one message comprising antenna information for a first wireless node transmitting the signals, and transmitting, by the mobile device, an information message including the antenna information for the first wireless node to a remote device configured to receive and store antenna data for multiple wireless nodes obtained by one or more wireless devices while visiting respective areas covered by the multiple wireless nodes.