-
公开(公告)号:US11792604B2
公开(公告)日:2023-10-17
申请号:US16441857
申请日:2019-06-14
发明人: Hui Chao , Saumitra Mohan Das , Yin Chen
IPC分类号: H04W4/029 , G06Q10/06 , G06Q30/0251 , G01S5/02 , H04W4/021
CPC分类号: H04W4/029 , G01S5/02524 , G06Q10/06 , G06Q30/0254 , G06Q30/0261 , G06Q30/0271 , H04W4/021
摘要: Methods and systems for providing information associated with a location history of a mobile device to one or more applications are disclosed. A mobile device generates one or more location history records based on one or more locations of the mobile device, each location history record comprising one or more points of interest and a duration at the one or more points of interest, receives an information request from at least one application, determines a subset of the one or more location history records that meet criteria from the information request, determines a level of permission for the at least one application based on the information request and the subset of the one or more location history records, and provides information associated with the subset of the one or more location history records to the at least one application based on the level of permission.
-
公开(公告)号:US10299082B2
公开(公告)日:2019-05-21
申请号:US16028402
申请日:2018-07-05
发明人: Hui Chao , Saumitra Mohan Das , Yin Chen
摘要: Methods and systems for providing information associated with a location history of a mobile device to one or more applications are disclosed. A mobile device generates one or more location history records based on one or more locations of the mobile device, each location history record comprising one or more points of interest and a duration at the one or more points of interest, receives an information request from at least one application, determines a subset of the one or more location history records that meet criteria from the information request, determines a level of permission for the at least one application based on the information request and the subset of the one or more location history records, and provides information associated with the subset of the one or more location history records to the at least one application based on the level of permission.
-
公开(公告)号:US10154048B2
公开(公告)日:2018-12-11
申请号:US15074745
申请日:2016-03-18
摘要: Various embodiments include methods, and computing devices implementing the methods, for authenticating vehicle information by polling selected sensors. A server computing device receiving vehicle information from a reporting vehicle may compare the received vehicle information to contextual information to generate a comparison result, and determine whether the received vehicle information should be evaluated with greater scrutiny based on the comparison result. The server computing device may select sensors for polling based on the received vehicle information (and in response to determining that the received vehicle information should be evaluated with greater scrutiny), and poll the selected sensors to received sensor information. The server computing device may use the received sensor information to corroborate the received vehicle information, and perform a responsive action based on the result of the corroboration.
-
公开(公告)号:US10045159B2
公开(公告)日:2018-08-07
申请号:US14791067
申请日:2015-07-02
发明人: Hui Chao , Saumitra Mohan Das , Yin Chen
摘要: Methods and systems for providing information associated with a location history of a mobile device to one or more applications are disclosed. A mobile device generates one or more location history records based on one or more locations of the mobile device, each location history record comprising one or more points of interest and a duration at the one or more points of interest, receives an information request from at least one application, determines a subset of the one or more location history records that meet criteria from the information request, determines a level of permission for the at least one application based on the information request and the subset of the one or more location history records, and provides information associated with the subset of the one or more location history records to the at least one application based on the level of permission.
-
公开(公告)号:US20180219885A1
公开(公告)日:2018-08-02
申请号:US15418693
申请日:2017-01-28
摘要: Various embodiments provide methods, devices, and non-transitory processor-readable storage media enabling rogue access point detection with a communications device by sending multiple probes via different network connections to a remote server and receiving probe replies. Various embodiments may include a communication device transmitting a first probe addressed to a server via a first network connection and a second probe addressed to the server via a second network connection. Upon receiving a first probe reply from the server via the first network connection and a second probe reply from the server via the second network connection server, the communications device may analyze the received probe replies to determine whether an access point of either the first network or the second network is a rogue access point.
-
公开(公告)号:US09973517B2
公开(公告)日:2018-05-15
申请号:US14149471
申请日:2014-01-07
发明人: Hsu-Chun Hsiao , Shuo Deng , Babak Salamat , Rajarshi Gupta , Saumitra Mohan Das
CPC分类号: H04L63/1416 , G06F21/52 , G06F21/552 , G06F21/554 , G06F21/56 , G06F21/566
摘要: Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware.
-
7.
公开(公告)号:US20180063179A1
公开(公告)日:2018-03-01
申请号:US15248178
申请日:2016-08-26
CPC分类号: H04L63/1433 , G06F1/28 , G06F21/564 , H04L63/1408
摘要: Various embodiments include methods and a memory data collection processor for performing online memory data collection for memory forensics. Various embodiments may include determining whether an operating system executing in a computing device is trustworthy. In response to determining that the operating system is not trustworthy, the memory data collection processor may collect memory data directly from volatile memory. Otherwise, the operating system to collect memory data from volatile memory. Memory data may be collected at a variable memory data collection rate determined by the memory data collection processor. The memory data collection rate may depend upon whether an available power level of the computing device exceeds a threshold power level, whether an activity state of the processor of the computing device equals a sleep state whether a security risk exists on the computing device, and whether a volume of memory traffic in the volatile memory exceeds a threshold volume.
-
公开(公告)号:US20180054449A1
公开(公告)日:2018-02-22
申请号:US15240721
申请日:2016-08-18
CPC分类号: H04L63/145 , G06F21/56 , G06F21/566 , G06F2221/033
摘要: A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collected from independent executions of different instances of the same software application on different client computing devices. The server computing device may combine the received data, and use the combined data to identify unexplored code space or potential code paths for evaluation. The server computing device may then exercise the software application through the identified unexplored code space or identified potential code paths in a client computing device emulator to generate analysis results, and use the generated analysis results to determine whether the software application is non-benign.
-
公开(公告)号:US20180039779A1
公开(公告)日:2018-02-08
申请号:US15228251
申请日:2016-08-04
发明人: Dong Li , Yin Chen , Saumitra Mohan Das
IPC分类号: G06F21/56
CPC分类号: G06F21/566 , G06F21/56 , G06F21/562 , G06F2221/033 , H04W12/00505 , H04W12/00508 , H04W12/1208
摘要: A computing device may be protected from non-benign behavior, malware, and cyber attacks by using a combination of predictive and real-time behavior-based analysis techniques. A computing device may be configured to identify anticipated behaviors of a software application before runtime, analyze the anticipated behaviors before runtime to generate static analysis results, commencing execution of the software application, analyze behaviors of the software application during runtime via a behavior-based analysis system, and control operations of the behavior-based analysis system based on the static analysis results.
-
10.
公开(公告)号:US09866993B2
公开(公告)日:2018-01-09
申请号:US14836308
申请日:2015-08-26
IPC分类号: H04M1/00 , H04W4/02 , H04W64/00 , G01S5/02 , G01S5/14 , G01S13/74 , H04B7/185 , H04B7/14 , H04B15/00 , H04B1/38 , H01Q1/00 , H01Q9/00 , H01Q21/00 , H01Q1/12
CPC分类号: H04W4/02 , G01S5/0236 , G01S5/14 , G01S13/74 , H04W64/00
摘要: Disclosed are methods, devices, systems, apparatus, servers, computer-/processor-readable media, and other implementations, including a method, performed at a processor-based wireless mobile device, that includes receiving, by the mobile device, signals that include at least one message comprising antenna information for a first wireless node transmitting the signals, and transmitting, by the mobile device, an information message including the antenna information for the first wireless node to a remote device configured to receive and store antenna data for multiple wireless nodes obtained by one or more wireless devices while visiting respective areas covered by the multiple wireless nodes.
-
-
-
-
-
-
-
-
-