Patent application number | Description | Published |
20110179027 | AUTOMATIC LINKING OF POINTS OF INTEREST FOR INDOOR LOCATION BASED SEARCHING - A database of the location based relationships of points of interest within an environment is automatically generated using a digital representation of the environment that includes the points of interest at different locations within the environment. The locations of the points of interest in the environment are identified and the location based relationships between the points of interest are determined. The points of interest are labeled with the determined relationships and the points of interest and labeled relationships are stored. For example, a graph structure may be produced where each node is a point of interest and the edges between nodes is labeled with the determined relationships. | 07-21-2011 |
20110190004 | Mobile Station Positioning Assistance With Local Mapping Data - Techniques are provided which may be implemented using various methods and/or apparatuses for use in providing positioning assistance data with local mapping data to mobile stations. For example, positioning assistance data may comprise and/or otherwise be based, at least in part, on local mapping data which may relate to a current location of the mobile station. Such positioning assistance data may, for example, be provided to a mobile station by a first server within a cellular network. | 08-04-2011 |
20110207410 | INTERFERENCE MANAGEMENT MESSAGING INVOLVING TERMINATION OF A REQUEST FOR REDUCTION IN INTERFERENCE - A set of nodes may communicate in a manner that is asynchronous with respect to the communication between other sets of nodes. To facilitate reservations of resources by different nodes, a node may transmit a message that requests neighboring nodes to limit their interfering transmissions on a given resource and then transmit another message to inform the neighboring nodes that the node is no longer using the resource. To address problems that may be caused by concurrent asynchronous transmissions by different nodes, a messaging scheme may be used to enable a first node to acquire control information transmitted by asynchronous neighboring nodes while the first node was transmitting, and was thereby unable to receive control messages. | 08-25-2011 |
20110246148 | Radio model updating - The subject matter disclosed herein relates to systems, methods, apparatuses, devices, articles, and means for updating radio models. For certain example implementations, a method for one or more server devices may comprise receiving at one or more communication interfaces at least one measurement that corresponds to a position of a first mobile device within an indoor environment. At least one radio model that is stored in one or more memories may be updated based, at least in part, on the at least one measurement to produce at least one updated radio model. The at least one radio model and the at least one updated radio model may correspond to the indoor environment. The at least one updated radio model may be transmitted to enable a second mobile device to use the at least one updated radio model for positioning within the indoor environment. Other example implementations are described herein. | 10-06-2011 |
20110251787 | Navigational Coordinate Systems in Conjunction with Transports and/or Mobile Devices - The subject matter disclosed herein relates to systems, methods, apparatuses, articles, and means for determining at least one navigational coordinate system to be utilized in conjunction with transports and/or mobile devices. For certain example implementations, a method by a mobile device that is at least proximate to a transport may comprise identifying a first navigational coordinate system, with the first navigational coordinate system being associated with the transport and enabling navigation within at least one navigable area of the transport. A second navigational coordinate system may also be identified. The mobile device may determine to utilize at least one of the first navigational coordinate system or the second navigational coordinate system based, at least in part, on one or more predetermined conditions. Other example implementations are described herein. | 10-13-2011 |
20110312277 | REQUESTED TRANSMISSION OF INTERFERENCE MANAGEMENT MESSAGES - A set of nodes may communicate in a manner that is asynchronous with respect to the communication between other sets of nodes. To facilitate reservations of resources by different nodes, a node may transmit a message that requests neighboring nodes to limit their interfering transmissions on a given resource and then transmit another message to inform the neighboring nodes that the node is no longer using the resource. To address problems that may be caused by concurrent asynchronous transmissions by different nodes, a messaging scheme may be used to enable a first node to acquire control information transmitted by asynchronous neighboring nodes while the first node was transmitting, and was thereby unable to receive control messages. | 12-22-2011 |
20120016872 | METHODS AND APPARATUSES FOR USE IN GENERATING AN ENCODED ROUTEABILITY GRAPH DESCRIPTION - Methods and apparatuses are provided that may be implemented in one or more electronic devices to generate an encoded routeability graph description corresponding to a diagram of a structure. The methods and apparatuses may, for example, implement a reduction process to reduce a number of grid points within an encoded routeability graph description, or which may be otherwise used to generate an encoded routeability graph description. | 01-19-2012 |
20120021762 | METHODS AND APPARATUSES FOR USE IN PROVIDING POSITION ASSISTANCE DATA TO MOBILE STATIONS - Methods and apparatuses are provided which may be implemented in various devices to provide position assistance data and/or the like to a mobile station with regard to at least one of a plurality of different indoor regions. | 01-26-2012 |
20120028649 | METHODS AND APPARATUSES FOR USE IN DETERMINING THAT A MOBILE STATION IS AT ONE OR MORE PARTICULAR INDOOR REGIONS - Methods and apparatuses are provided which may be implemented in various devices for to determine or assist in determining that a mobile station is at one or more particular indoor regions and to provide positioning assistance data and/or the like to the mobile station with regard to at least the one or more particular indoor regions. | 02-02-2012 |
20120028654 | METHODS AND APPARATUSES FOR MOBILE STATION CENTRIC DETERMINATION OF POSITIONING ASSISTANCE DATA - Methods and apparatuses are provided which may be implemented in various devices to generate positioning assistance data and/or the like by mobile station with regard to at least one of a plurality of different indoor regions. | 02-02-2012 |
20120044265 | INDOOR LIKELIHOOD HEATMAP - The subject matter disclosed herein may relate to methods, apparatuses, systems, devices, articles, or means for generating or using an indoor likelihood heatmap, etc. For certain example implementations, a method for a device may comprise projecting multiple grid points over a schematic map of an indoor area, with the schematic map indicating multiple obstructions of the indoor area. Feasible paths between grid point pairs of the multiple grid points may be determined. For a particular grid point of the multiple grid points, a count of the feasible paths that traverse the particular grid point may be determined. A likelihood heatmap for use in one or more navigational applications may be generated based, at least in part, on the count. Other example implementations are described herein. | 02-23-2012 |
20120046045 | METHODS AND APPARATUSES FOR USE IN ESTIMATING A LOCATION OF A MOBILE DEVICE WITHIN A STRUCTURE - Methods and apparatuses are provided that may be implemented in a mobile device to determine two or more variations between a baseline probability distribution and two or more probability distributions for signals received from two or more sets of transmitters assigned to two or more regions of a structure. The methods and apparatuses may be further implemented to determine whether the mobile device is located in at least one of the two or more regions based, at least in part, on a comparison of the two or more determined variations. | 02-23-2012 |
20120131223 | Object-Based Transport Protocol - Methods and apparatuses are provided that facilitate providing an object-based transport protocol that allows transmission of arbitrarily sized objects over a network protocol layer. The object-based transport protocol can also provide association of metadata with the objects to control communication thereof, and/or communication of response objects. Moreover, the object-based transport protocol can maintain sessions with remote network nodes that can include multiple channels, which can be updated over time to seamlessly provide mobility, increased data rates, and/or the like. In addition, properties can be modified remotely by network nodes receiving objects related to the properties. | 05-24-2012 |
20120179448 | METHODS AND APPARATUSES FOR USE IN PROVIDING TRANSLATION INFORMATION SERVICES TO MOBILE STATIONS - Techniques are provided which may be implemented using various methods and/or apparatuses to allow a mobile station to request and receive translation information associated with a location (e.g., a region, a point of interest, etc.). The translation information may be based, at least in part, on historical information associated with at least one other request associated with the location and previously obtained from at least one other mobile station. | 07-12-2012 |
20120225663 | RSSI-BASED INDOOR POSITIONING IN THE PRESENCE OF DYNAMIC TRANSMISSION POWER CONTROL ACCESS POINTS - A position fix for a mobile platform is determined using RSSI values for wireless signals received from access points (APs), at least one of which has dynamic transmission power control. The transmission power data for the APs is received from an entity separate from the APs, e.g., a central entity or a positioning assistance server. The RSSI values for wireless signals received from the APs are acquired, as is an RSSI heatmap. Using the transmission power data, the RSSI values and the RSSI heatmap, the position fix for the mobile platform is determined. The position fix may be determined by the mobile platform or a positioning assistance server. Additionally, a server may receive transmission power data for APs and may provide to a mobile platform RSSI heatmap information based on the transmission power data. The RSSI heatmap information may be, e.g., the transmission power data or a RSSI heatmap. | 09-06-2012 |
20120295654 | MEASUREMENTS AND INFORMATION GATHERING IN A WIRELESS NETWORK ENVIRONMENT - Disclosed are methods, apparatus, computer readable media and other implementations, including a method for communicating network information. The method includes transmitting a request message from a mobile device to an access point, and receiving, at the mobile device, a reply message transmitted from the access point in response to receiving the request message, the reply message including data representative of a transmitted signal power level at the access point of the reply message. The method further includes determining, based on the received reply message including the data representative of the transmitted signal power level at the access point, a received signal power level at the mobile device of the reply message, and a round trip time from a first time instance when the request message was transmitted from the mobile device to a second time instance when the reply message was received at the mobile device. | 11-22-2012 |
20130012235 | Venue application for mobile station position estimation - Disclosed is a method, and a system to perform the method, comprising receiving venue infrastructure information at an entity hosted on a mobile station, and selectively providing a portion of the venue infrastructure information to one or more other entities hosted on the mobile station based, at least in part, on a privilege level attributed to the mobile station or a user associated with the mobile station. | 01-10-2013 |
20130017840 | POSITION ESTIMATING FOR A MOBILE DEVICE - Disclosed are methods, techniques and/or systems for selecting and/or determining a strategy and/or approach for searching for signals at a mobile device. Characteristics of and/or information obtained from such searched signals may be used in estimating a location of the mobile device. In one particular example, a strategy and/or approach for searching for wireless signals may be based, at least in part, on an availability of resources at a mobile device. | 01-17-2013 |
20130017842 | RADIO MODEL UPDATING - The subject matter disclosed herein relates to systems, methods, apparatuses, devices, articles, and means for updating radio models. For certain example implementations, a method for one or more server devices may comprise receiving at one or more communication interfaces at least one measurement that corresponds to a position of a first mobile device within an indoor environment. At least one radio model that is stored in one or more memories may be updated based, at least in part, on the at least one measurement to produce at least one updated radio model. The at least one radio model and the at least one updated radio model may correspond to the indoor environment. The at least one updated radio model may be transmitted to enable a second mobile device to use the at least one updated radio model for positioning within the indoor environment. Other example implementations are described herein. | 01-17-2013 |
20130035110 | LIKELIHOOD OF MOBILE DEVICE PORTAL TRANSITION - The subject matter disclosed herein may relate to methods, apparatuses, systems, devices, articles, or means for conditionally performing a scan responsive to a likelihood of a portal transition, etc. For certain example implementations, a method for a mobile device may comprise determining an indication of a likelihood that a position of the mobile device is transitioning from a first area identifiable by a first location context identifier to a second area identifiable by a second location context identifier via a portal linking the first area and the second area; and conditionally performing a scan for signals transmitted by one or more transmitter devices corresponding to the second area responsive to the indication of the likelihood that the position of the mobile device is transitioning to the second area via the portal. Other example implementations are described herein. | 02-07-2013 |
20130045751 | LOGO DETECTION FOR INDOOR POSITIONING - Example methods, apparatuses, or articles of manufacture are disclosed herein that may be utilized, in whole or in part, to facilitate or support one or more operations or techniques for logo detection for indoor positioning for use in or with a mobile device. Briefly, in accordance with one implementation, a method may include extracting, at a mobile device, visual features from one or more images captured via a camera sensor of the mobile device; and estimating a location of the mobile device based, at least in part, on a match between extracted visual features and one or more brand-specific visual signatures associated with one or more points of interest of one or more known locations. In some instances, an estimated location of a mobile device may be refined based, at least in part, on at least one additional POI of one or more POIs of one or more known locations. | 02-21-2013 |
20130045758 | PEER DEVICE SUPPORTED LOCATION-BASED SERVICE PROVIDER CHECK-IN - Methods, apparatuses and articles of manufacture are provided for use in checking-in a mobile device with a location based service provider at a venue location. A candidate device check-in profile for a candidate device and one or more check-in validation schemes may, for example, be provided, directly or indirectly, to a computing device via the candidate device and/or one or more peer devices. The candidate device may, for example, be checked-in with the location based service provider in response to a determination that the candidate device check-in profile is valid. | 02-21-2013 |
20130079033 | POSITION ESTIMATION VIA PROXIMATE FINGERPRINTS - Example methods, apparatuses, or articles of manufacture are disclosed herein that may be utilized, in whole or in part, to facilitate or support one or more operations or techniques for position estimation via one or more proximate fingerprints for use in or with a mobile communication device. | 03-28-2013 |
20130084891 | FLEXIBLE ARCHITECTURE FOR LOCATION BASED CROWDSOURCING OF CONTEXTUAL DATA - A system for the collection, aggregation and analysis of location based crowdsourcing data includes a server that server that controls the distribution of crowdsourcing requests and workloads to a plurality of external mobile platforms. The server receives crowdsourcing queries from multiple parties and provides measurement requests to the mobile platforms, e.g., based on the location of the mobile platforms. Upon receipt of the measured contextual data from the mobile platforms, the server may distribute information, such as the raw measured contextual data or an analysis of the measured contextual data, to the appropriate requesting parties in a secure manner. The mobile platform may receive a plurality of measurement requests from a remote server, wherein the plurality of measurement requests are based on crowdsourcing queries from a plurality of parties. The mobile platform may measure and provide to the remote server contextual data in response to the plurality of measurement requests. | 04-04-2013 |
20130096885 | DETERMINING A LIKELIHOOD OF A DIRECTIONAL TRANSITION AT A JUNCTION IN AN ENCODED ROUTABILITY GRAPH DESCRIPTION - Techniques are provided, which may be implemented in various methods, apparatuses, and/or articles of manufacture, to obtain an encoded routability graph representative of feasible paths in an indoor environment represented by an encoded map, and assign likelihoods of transition from an ingress edge in the encoded routability graph to individual egress edges through a junction connecting the ingress edge to a plurality of egress edges based, at least in part, on one or more features of the encoded map. | 04-18-2013 |
20130101163 | METHOD AND/OR APPARATUS FOR LOCATION CONTEXT IDENTIFIER DISAMBIGUATION - The subject matter disclosed herein relates to a method, apparatus, and/or system for obtaining one or more images captured at a mobile device and determining a location context identifier (LCI) identifying an area including a location of the mobile device based, at least in part, on the one or more captured images. The LCI may be selected from among a plurality of LCIs. | 04-25-2013 |
20130148632 | USING IDENTIFIER MAPPING TO RESOLVE ACCESS POINT IDENTIFIER AMBIGUITY - Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal | 06-13-2013 |
20130150046 | USING IDENTIFIER MAPPING TO RESOLVE ACCESS POINT IDENTIFIER AMBIGUITY - Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal. | 06-13-2013 |
20130172009 | Methods and apparatuses for use in determining a location of a mobile device within a mutli-level physical structure - Methods and apparatuses are provided that may be implemented in a mobile device to determine that the mobile device is located within a particular level of a multi-level physical structure based, at least in part, on a comparison of measured wireless signals and stored measurements of wireless signals. | 07-04-2013 |
20130184012 | Radio model updating - The subject matter disclosed herein relates to systems, methods, apparatuses, devices, articles, and means for updating radio models. For certain example implementations, a method for one or more server devices may comprise receiving at one or more communication interfaces at least one measurement that corresponds to a position of a first mobile device within an indoor environment. At least one radio model that is stored in one or more memories may be updated based, at least in part, on the at least one measurement to produce at least one updated radio model. The at least one radio model and the at least one updated radio model may correspond to the indoor environment. The at least one updated radio model may be transmitted to enable a second mobile device to use the at least one updated radio model for positioning within the indoor environment. Other example implementations are described herein. | 07-18-2013 |
20130212094 | VISUAL SIGNATURES FOR INDOOR POSITIONING - Systems and methods for managing and utilizing visual signature (VS) databases are described herein. A method for managing a VS database as described herein includes obtaining a plurality of images of objects represented by a VS; obtaining context information associated with the plurality of images; grouping the plurality of images into one or more context classifications according to the context information associated with the plurality of images; for respective ones of the one or more context classifications, selecting an image representative of the VS according to one or more criteria; and adding the selected images for the respective ones of the one or more context classifications to entries of the VS database corresponding to the VS. | 08-15-2013 |
20130230208 | VISUAL OCR FOR POSITIONING - A mobile device can receive OCR library information associated with a coarse position. The coarse position can be determined by the mobile device, or by a network server configured to communicate with the mobile device. A camera on the mobile device can obtain images of human-readable information in an area near the coarse position. The view finder image can be processed with an OCR engine that is utilizing the OCR library information to determine one or more location string values. A location database can be searched based on the location string values. The position of the mobile device can be estimated and displayed. The position estimated can be adjusted based on the proximity of the mobile device to other features in the image. | 09-05-2013 |
20130244624 | SELECTIVE DISTRIBUTION OF LOCATION BASED SERVICE CONTENT TO MOBILE DEVICES - Methods, apparatuses and/or articles of manufacture are provided that selectively distribute location based service content for use by mobile devices with regard to certain indoor environment(s). In one example implementation, one or more computing devices generate data files that collectively represent an initial content for use by a mobile device with regard to an indoor environment, wherein at least one of the data files is generated based, at least in part, on one or more distribution schemes relating to the indoor environment. The one or more computing devices selectively initiates transmission of an indication to one or more mobile devices identifying that a shared data file corresponding to a seeded data file may be obtained from a first mobile device. The first mobile device and/or one or more of the other mobile devices may be identified based, at least in part, on the one or more distribution schemes. | 09-19-2013 |
20130247187 | Computing device to detect malware - Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware. | 09-19-2013 |
20130267201 | Method for malicious activity detection in a mobile station - Disclosed is a method for malicious activity detection in a mobile station of a particular model. In the method, generic malicious behavior patterns are received from a network-based malicious behavior profiling system. Mobile-station-model-specific-behavior-analysis algorithms are generated in the mobile station based on the generic malicious behavior patterns. Mobile station operations may be observed to generate a mobile station activity observation. The mobile station activity observation may be analyzed using the mobile-station-model-specific-behavior-analysis algorithms to generate an activity analysis. Malicious activity may be detected based on the activity analysis. | 10-10-2013 |
20130267260 | MAP MODIFICATION USING GROUND-TRUTH MEASUREMENTS - Disclosed is a method for receiving a conceptual map of a navigable area, the conceptual map including two or more topological elements being related to one another in the conceptual map by a first set of dimensions; applying one or more ground truth measurements or topological constraints to the first set of dimensions of the conceptual map to provide a modified map having corrected dimensions; and mapping an estimated location of the mobile station to the modified map. | 10-10-2013 |
20130268232 | Informative Display for Statistical Positioning System - System and method for providing informative display for statistical positioning system are disclosed. In one embodiment, the method includes receiving a statistical distribution of user locations in an area, where the statistical distribution of user locations includes a plurality of points representing likelihood of a user at corresponding locations, generating a weighted statistical distribution of user locations using an inverse distance weighting function, determining one or more estimated locations of the user using the weighted statistical distribution, and displaying the one or more estimated locations of the user, or a representation of the weighted statistical distribution of user position in a display. | 10-10-2013 |
20130295952 | ADAPTIVE UPDATING OF INDOOR NAVIGATION ASSISTANCE DATA FOR USE BY A MOBILE DEVICE - Various methods, apparatuses and articles of manufacture may be implemented for use in one or more computing platforms to adaptively provide and/or obtain indoor navigation assistance data (INAD) update(s) for use by a mobile device. An INAD update may, for example, comprise a subset of INAD available for an indoor environment. Such a subset may be determined based, at least in part, on a bounded region in an electronic map of the indoor environment. Such a bounded region may, for example, have a shape and/or a size based, at least in part, on at least one parameter indicative of a motion state of the mobile device. | 11-07-2013 |
20130303154 | SYSTEM, APPARATUS, AND METHOD FOR ADAPTIVE OBSERVATION OF MOBILE DEVICE BEHAVIOR - Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. Various aspects may correct suspicious or performance-degrading mobile device behaviors. Various aspects may prevent identified suspicious or performance-degrading mobile device behaviors from degrading the performance and power utilization levels of a mobile device over time. Various aspects may restore an aging mobile device to its original performance and power utilization levels. | 11-14-2013 |
20130303159 | COLLABORATIVE LEARNING FOR EFFICIENT BEHAVIORAL ANALYSIS IN NETWORKED MOBILE DEVICE - Methods, systems and devices for classifying mobile device behaviors of a first mobile device may include the first mobile device monitoring mobile device behaviors to generate a behavior vector, and applying the behavior vector to a first classifier model to obtain a first determination of whether a mobile device behavior is benign or not benign. The first mobile device may also send the behavior vector to a second mobile device, which may receive and apply the behavior vector to a second classifier model to obtain a second determination of whether the mobile device behavior is benign or not benign. The second mobile device may send the second determination to the first mobile device, which may receive the second determination, collate the first determination and the second determination to generate collated results, and determine whether the mobile device behavior is benign or not benign based on the collated results. | 11-14-2013 |
20130304676 | ON-DEVICE REAL-TIME BEHAVIOR ANALYZER - Methods, systems and devices for generating data models in a communication system may include applying machine learning techniques to generate a first family of classifier models using a boosted decision tree to describe a corpus of behavior vectors. Such behavior vectors may be used to compute a weight value for one or more nodes of the boosted decision tree. Classifier models factors having a high probably of determining whether a mobile device behavior is benign or not benign based on the computed weight values may be identified. Computing weight values for boosted decision tree nodes may include computing an exclusive answer ratio for generated boosted decision tree nodes. The identified factors may be applied to the corpus of behavior vectors to generate a second family of classifier models identifying fewer factors and data points relevant for enabling the mobile device to determine whether a behavior is benign or not benign. | 11-14-2013 |
20130304677 | Architecture for Client-Cloud Behavior Analyzer - Methods, systems and devices for generating data models in a client-cloud communication system may include applying machine learning techniques to generate a first family of classifier models that describe a cloud corpus of behavior vectors. Such vectors may be analyzed to identify factors in the first family of classifier models that have the highest probably of enabling a mobile device to conclusively determine whether a mobile device behavior is malicious or benign. Based on this analysis, a a second family of classifier models may be generated that identify significantly fewer factors and data points as being relevant for enabling the mobile device to conclusively determine whether the mobile device behavior is malicious or benign based on the determined factors. A mobile device classifier module based on the second family of classifier models may be generated and made available for download by mobile devices, including devices contributing behavior vectors. | 11-14-2013 |
20130304869 | Communicating Behavior Information in a Mobile Computing Device - Methods, systems and devices for communicating behavior analysis information using an application programming interface (API) may include receiving data/behavior models from one or more third-party network servers in a client module of a mobile device and communicating the information to a behavior observation and analysis system via a behavior API. The third-party servers may be maintained by one or more partner companies that have domain expertise in a particular area or technology that is relevant for identifying, analyzing, classifying, and/or reacting to mobile device behaviors, but that do not have access to (or knowledge of) the various mobile device sub-systems, interfaces, configurations, modules, processes, drivers, and/or hardware systems required to generate effective data/behavior models suitable for use by the mobile device. The behavior API and/or client modules allow the third-party server to quickly and efficiently access the most relevant and important information on the mobile device. | 11-14-2013 |
20130305101 | Techniques for Autonomic Reverting to Behavioral Checkpoints - Aspect methods, systems and devices may be configured to create/capture checkpoints without significantly impacting the performance, power consumption, or responsiveness of the mobile device. An observer module of the mobile device may instrument or coordinate various application programming interfaces (APIs) at various levels of the mobile device system and constantly monitor the mobile device (via a low power process, background processes, etc.) to identify the normal operation patterns of the mobile device and/or to identify behaviors that are not consistent with previously computed normal operation patterns. The mobile device may store mobile device state information in a memory as a stored checkpoint when it determines that the mobile device behaviors are consistent with normal operation patterns, and upload a previously stored checkpoint to a backup storage system when it determines that the mobile device behaviors are not consistent with normal operation patterns. | 11-14-2013 |
20130305358 | Minimizing Latency of Behavioral Analysis Using Signature Caches - The various aspects include methods, systems, and devices configured to make use of caching techniques and behavior signature caches to improve processor performance and/or reduce the amount of power consumed by the computing device by reducing analyzer latency. The signature caching system may be configured to adapt to rapid and frequent changes in behavioral specifications and models and provide a multi-fold improvement in the scalability of behavioral analysis operations performed on the mobile device. | 11-14-2013 |
20130316742 | Method and apparatus for transmitting indoor context information - The subject matter disclosed herein relates to a system and method for determining indoor context information relating to a location of a mobile device. Indoor context information may be utilized by a mobile device or a network element to obtain an estimate of a location of the mobile device within an indoor environment. | 11-28-2013 |
20130317778 | Method and apparatus for transmitting indoor context information - The subject matter disclosed herein relates to a system and method for determining indoor context information relating to a location of a mobile device. Indoor context information may be utilized by a mobile device or a network element to obtain an estimate of a location of the mobile device within an indoor environment. | 11-28-2013 |
20130342565 | INDOOR STRUCTURE INFERENCE USING POINTS OF INTEREST - In one implementation, a method may comprise: obtaining a digital map of an indoor region that identifies boundaries between subsections within the indoor region; and approximating locations of walls separating rooms within at least one of the subsections based, at least in part, on locations of feature labels provided in the digital map. | 12-26-2013 |
20140032161 | MULTI-LEVEL LOCATION DISAMBIGUATION - A method of disambiguating a location of a mobile station within a structure includes: obtaining, at the mobile station, regional pressure indications and corresponding region indications indicating regions within a structure that are vertically displaced with respect to each other, each of the regional pressure indications indicating atmospheric pressure information associated with the corresponding region; determining mobile station pressure information associated with a present location of the mobile station; comparing the mobile station pressure information with the regional pressure indications; and based on the comparing, determining in which of the regions the mobile station presently resides. | 01-30-2014 |
20140051432 | SECURE BEHAVIOR ANALYSIS OVER TRUSTED EXECUTION ENVIRONMENT - Systems and methods for recognizing and reacting to malicious or performance-degrading behaviors in a mobile device include observing mobile device behaviors in an observer module within a privileged-normal portion of a secure operating environment to identify a suspicious mobile device behavior. The observer module may generate a concise behavior vector based on the observations, and provide the vector to an analyzer module in an unprivileged-secure portion of the secure operating environment. The vector may be analyzed in the unprivileged-secure portion to determine whether the mobile device behavior is benign, suspicious, malicious, or performance-degrading. If the behavior is found to be suspicious, operations of the observer module may be adjusted, such as to perform deeper observations. If the behavior is found to be malicious or performance-degrading behavior the user and/or a client module may be alerted in a secure, tamper-proof manner. | 02-20-2014 |
20140053260 | Adaptive Observation of Behavioral Features on a Mobile Device - Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. | 02-20-2014 |
20140053261 | On-Line Behavioral Analysis Engine in Mobile Device with Multiple Analyzer Model Providers - Methods, systems and devices for generating data models in a client-cloud communication system may include applying machine learning techniques to generate a first family of classifier models that describe a cloud corpus of behavior vectors. Such vectors may be analyzed to identify factors in the first family of classifier models that have the highest probability of enabling a mobile device to better determine whether a mobile device behavior is malicious or benign. Based on this analysis, a second family of classifier models may be generated that identify significantly fewer factors and data points as being relevant for enabling the mobile device to better determine whether the mobile device behavior is malicious or benign based on the determined factors. A mobile device classifier module based on the second family of classifier models may be generated and made available for download by mobile devices, including devices contributing behavior vectors. | 02-20-2014 |
20140066103 | Mobile device locating in conjunction with localized environments - The subject matter disclosed herein relates to systems, methods, apparatuses, articles, etc. for mobile device locating in conjunction with localized environments. For certain example implementations, a method may comprise obtaining at a mobile device one or more signals comprising information indicative of a location thereof. The information may be transmitted to one or more servers. A location context identifier (LCI) may be received responsive to the transmitting, with the LCI corresponding to a localized environment at which the mobile device is located. The LCI may be transmitted to the one or more servers. Location-based data may be received responsive to the transmitting of the LCI, with the location-based data being associated with the LCI and pertaining to the localized environment. The location of the mobile device may be determined with respect to the localized environment based, at least in part, on the location-based data. Other example implementations are described herein. | 03-06-2014 |
20140071897 | Synchronizing a Base Station in a Wireless Communication System - A method for synchronizing a wireless communication system is disclosed. A silence duration for a base station is determined based on the time required for a neighbor base station to obtain or maintain synchronization. All transmissions from the base station are ceased for the silence duration. Multiple base stations level may cease transmissions at the same time, thus mitigating interference. | 03-13-2014 |
20140094199 | TECHNIQUES FOR FASTER TIME-TO-FIRST-FIX - Example methods, apparatuses, or articles of manufacture are disclosed herein that may be utilized, in whole or in part, to facilitate or support one or more operations or techniques for a relatively faster time-to-first-fix, such as for use in or with a mobile communication device. Briefly, in accordance with at least one implementation, a method may include transmitting a first message to a mobile device, the first message comprising abbreviated positioning assistance data; receiving a second message from the mobile device, the second message comprising an indication of a coarse location of the mobile device; and transmitting a third message to the mobile device, the third message comprising a detailed tiled radio heat map obtained based, at least in part, on the received indication of the coarse location of the mobile device. | 04-03-2014 |
20140123289 | Computing Device to Detect Malware - Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware. | 05-01-2014 |
20140128093 | PORTAL TRANSITION PARAMETERS FOR USE IN MOBILE DEVICE POSITIONING - Various methods, apparatuses and/or articles of manufacture are provided for use in one or more electronic devices to perform and/or otherwise support certain positioning capabilities with regard to a mobile device. For example, certain positioning capabilities may make use of one or more portal transition parameters that may be based, at least in part, on a determined likelihood that a mobile device, if located in a first region of a specific environment and within a threshold area of a portal connecting the first region to a second region of the specific environment, may or may not make use of the portal to transition from the first region to the second region, e.g., through the portal. | 05-08-2014 |
20140150100 | Adaptive Observation of Driver and Hardware Level Behavioral Features on a Mobile Device - Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. | 05-29-2014 |
20140153773 | Image-Based Indoor Position Determination - In one implementation, a method may comprise: determining a topological representation of an indoor portion of a building based, at least in part, on positions or number of lines in an image of the indoor portion of the building; and comparing the topological representation to one or more stored topological representations, for example in a digital map of the building, to determine a potential position of the indoor portion of the building. | 06-05-2014 |
20140162589 | SYSTEM AND/OR METHOD OF LOCATING A PORTABLE SERVICE ACCESS TRANSCEIVER - Described are devices, methods, techniques and systems for locating a portable services access transceiver (PSAT) for use in aiding emergency “911” services. In one implementation, one or more conditions indicative of movement of a PSAT may initiate a process for obtaining a new estimated location of the PSAT. In another implementation, a location of a PSAT may be determined or updated using indoor navigation techniques. | 06-12-2014 |
20140187177 | METHODS AND SYSTEMS OF DYNAMICALLY GENERATING AND USING DEVICE-SPECIFIC AND DEVICE-STATE-SPECIFIC CLASSIFIER MODELS FOR THE EFFICIENT CLASSIFICATION OF MOBILE DEVICE BEHAVIORS - The various aspects provide a mobile device and methods implemented on the mobile device for modifying behavior models to account for device-specific or device-state-specific features. In the various aspects, a behavior analyzer module may leverage a full feature set of behavior models (i.e. a large classifier model) received from a network server to create lean classifier models for use in monitoring for malicious behavior on the mobile device, and the behavior analyzer module may dynamically modify these lean classifier models to include features specific to the mobile device and/or the mobile device's current configuration. Thus, the various aspects may enhance overall security for a particular mobile device by taking the mobile device and its current configuration into account and may improve overall performance by monitoring only features that are relevant to the mobile device. | 07-03-2014 |
20140188781 | Methods and Systems of Using Boosted Decision Stumps and Joint Feature Selection and Culling Algorithms for the Efficient Classification of Mobile Device Behaviors - Methods and systems for classifying mobile device behavior include configuring a server use a large corpus of mobile device behaviors to generate a full classifier model that includes a finite state machine suitable for conversion into boosted decision stumps and/or which describes all or many of the features relevant to determining whether a mobile device behavior is benign or contributing to the mobile device's degradation over time. A mobile device may receive the full classifier model and use the model to generate a full set of boosted decision stumps from which a more focused or lean classifier model is generated by culling the full set to a subset suitable for efficiently determining whether mobile device behavior are benign. Boosted decision stumps may be culled by selecting all boosted decision stumps that depend upon a limited set of test conditions. | 07-03-2014 |
20140195157 | APPLYING AN INDICATION OF A LIKELIHOOD OF A DIRECTIONAL TRANSITION AT A JUNCTION IN AN ENCODED ROUTABILITY GRAPH DESCRIPTION TO A POSITIONING FUNCTION OF A MOBILE DEVICE - Techniques are provided for a mobile, which may be implemented in various methods, apparatuses, and/or articles of manufacture to obtain an encoded routability graph representative of feasible paths for an indoor environment, along with values indicative of likelihoods of transition at certain junctions identifiable in the encoded routability graph, and determine one or both of an estimated position or an estimated direction of travel of the mobile device. | 07-10-2014 |
20140205099 | Inter-Module Authentication for Securing Application Execution Integrity Within A Computing Device - Systems and methods for recognizing and reacting to malicious or performance-degrading behaviors in a mobile device include observing mobile device behaviors in an observer module within a privileged-normal portion of a secure operating environment to identify a suspicious mobile device behavior. The observer module may generate a concise behavior vector based on the observations, and provide the vector to an analyzer module in an unprivileged-secure portion of the secure operating environment. The vector may be analyzed in the unprivileged-secure portion to determine whether the mobile device behavior is benign, suspicious, malicious, or performance-degrading. If the behavior is found to be suspicious, operations of the observer module may be adjusted, such as to perform deeper observations. If the behavior is found to be malicious or performance-degrading behavior the user and/or a client module may be alerted in a secure, tamper-proof manner. | 07-24-2014 |
20140222334 | METHOD AND APPARATUS FOR IDENTIFICATION OF POINTS OF INTEREST WITHIN A PREDEFINED AREA - The subject matter disclosed herein relates to a system and method for identification of points of interest within a predefined area. Location estimates for substantially stationary mobile devices may be utilized to determine locations of one or more points of interest. Location estimates for mobile devices in motion may be utilized to determine locations of one or more corridors. | 08-07-2014 |
20140223553 | Location based process-monitoring - Disclosed are systems, apparatus, devices, methods, computer program products, and other implementations, including a method that includes determining location of a device, and controlling monitoring of behavior of one or more processes executing on the device based on the determined location of the device to identify potential one or more security-risky processes from the monitored one or more executing processes. In some embodiments, controlling the monitoring of the behavior of the one or more processes may include one or more of, for example, adjusting frequency of the monitoring of the one or more processes based on the determined location of the device, adjusting level of detail obtained for the monitored behavior of the one or more processes based on the determined location of the device, and/or adjusting features being observed for the monitored one or more processes based on the determined location of the device. | 08-07-2014 |
20140237595 | APIs for Obtaining Device-Specific Behavior Classifier Models from the Cloud - The various aspects provide a system and methods implemented on the system for generating a behavior model on a server that includes features specific to a mobile computing device and the device's current state/configuration. In the various aspects, the mobile computing device may send information identifying itself, its features, and its current state to the server. In response, the server may generate a device-specific lean classifier model for the mobile computing device based on the device's information and state and may send the device-specific lean classifier model to the device for use in detecting malicious behavior. The various aspects may enhance overall security and performance on the mobile computing device by leveraging the superior computing power and resources of the server to generate a device-specific lean classifier model that enables the device to monitor features that are actually present on the device for malicious behavior. | 08-21-2014 |
20140245306 | Adaptive Observation of Behavioral Features On A Heterogeneous Platform - Methods, devices and systems for monitoring behaviors of a mobile computing device include observing in a non-master processing core a portion of a mobile device behavior that is relevant to the non-master processing core, generating a behavior signature that describes the observed portion of the mobile device behavior, and sending the generated behavior signature to a master processing core. The master processing core combines two or more behavior signatures received from the non-master processing cores to generate a global behavior vector, which may be used by an analyzer module to determine whether a distributed software application is not benign. | 08-28-2014 |
20140283024 | Method for efficient behavioral analysis on a mobile station - Disclosed is a method for efficient behavioral analysis on a mobile station. In the method, one or more first behavioral characteristics associated with a first state of a finite state machine are observed. The one or more first behavioral characteristics may comprise a first subset of observable behavioral characteristics. The mobile station transitions from the first state to a second state. One or more second behavioral characteristics associated with the second state of the finite state machine are observed. The one or more second behavioral characteristics may comprise a second subset of the observable behavioral characteristics. | 09-18-2014 |
20140315575 | METHODS AND APPARATUSES FOR USE IN DETERMINING THAT A MOBILE STATION IS AT ONE OR MORE PARTICULAR INDOOR REGIONS - Methods and apparatuses are provided which may be implemented in various devices for to determine or assist in determining that a mobile station is at one or more particular indoor regions and to provide positioning assistance data and/or the like to the mobile station with regard to at least the one or more particular indoor regions. | 10-23-2014 |
20140315580 | METHODS AND APPARATUSES FOR USE IN DETERMINING THAT A MOBILE STATION IS AT ONE OR MORE PARTICULAR INDOOR REGIONS - Methods and apparatuses are provided which may be implemented in various devices for to determine or assist in determining that a mobile station is at one or more particular indoor regions and to provide positioning assistance data and/or the like to the mobile station with regard to at least the one or more particular indoor regions. | 10-23-2014 |
20140315581 | METHODS AND APPARATUSES FOR USE IN DETERMINING THAT A MOBILE STATION IS AT ONE OR MORE PARTICULAR INDOOR REGIONS - Methods and apparatuses are provided which may be implemented in various devices for to determine or assist in determining that a mobile station is at one or more particular indoor regions and to provide positioning assistance data and/or the like to the mobile station with regard to at least the one or more particular indoor regions. | 10-23-2014 |
20140317734 | Adaptive Observation of Behavioral Features on a Mobile Device - Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. | 10-23-2014 |
20140331272 | Location based enforcement of mobile policy - Disclosed are systems, apparatus, devices, methods, computer program products, computer media, and other implementations, including a method that includes communicating data representative of one or more location-based restrictions corresponding to a venue area to a mobile device determined to be located within the venue area, and controlling, by at least one venue server, use at the mobile device of services available at the venue area from one or more nodes associated with the venue area based, at least in part, on a determination, by the at least one venue server, of whether the mobile device complies with the location-based restrictions corresponding to the venue area. | 11-06-2014 |
20140335892 | METHODS AND APPARATUSES FOR USE IN PROVIDING NAVIGATION ASSISTANCE DATA TO MOBILE STATIONS - Methods and apparatuses are provided which may be implemented in various devices to provide navigation assistance data and/or the like to a mobile station with regard to at least one of a plurality of different indoor regions. For example, a computing platform of a map inference device may establish encoded metadata for at least a portion of an indoor region based, at least in part, on an electronic map, an access point locator, or some combination thereof, and provide such encoded metadata to a repository device that may provide at least a portion of the encoded metadata to a mobile station. | 11-13-2014 |
20140337862 | Methods, Devices, and Systems for Communicating Behavioral Analysis Information - Methods, systems and devices for communicating behavior analysis information using an application programming interface (API) may include receiving via the API a request to register the second module to access an operation of a behavioral monitoring system of the mobile computing device, and exchanging authentication information between the first module and the second module to accomplish mutual authentication. Aspects may include receiving via the API a request for version identification information that may be used by the server to determine how to interpret, evaluate, or crowd-source information, and exchanging version identification information between the first module and the second module to cause the second module to send the information to the server. Aspects may further include receiving via the API a provision malware model request including a command causing the first module to send a malware or classifier model to a behavioral monitoring system of the mobile computing device. | 11-13-2014 |
20140362773 | LOCAL IP ACCESS SCHEME - Local IP access is provided in a wireless network to facilitate access to one or more local services. In some implementations, different IP interfaces are used for accessing different services (e.g., local services and operator network services). A list that maps packet destinations to IP interfaces may be employed to determine which IP interface is to be used for sending a given packet. In some implementations an access point provides a proxy function (e.g., a proxy ARP function) for an access terminal. In some implementations an access point provides an agent function (e.g., a DHCP function) for an access terminal. NAT operations may be performed at an access point to enable the access terminal to access local services. In some aspects, an access point may determine whether to send a packet from an access terminal via a protocol tunnel based on the destination of the packet. | 12-11-2014 |
20140370875 | CONFIGURING AN IDENTIFIER FOR AN ACCESS POINT - An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server. | 12-18-2014 |
20150082430 | Data Flow Based Behavioral Analysis on Mobile Devices - Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. | 03-19-2015 |
20150082441 | Exploiting Hot Application Programming Interfaces (APIs) and Action Patterns for Efficient Storage of API logs on Mobile Devices for Behavioral Analysis - Methods and devices for detecting suspicious or performance-degrading mobile device behaviors may include performing behavior monitoring and analysis operations to intelligently, dynamically, and/or adaptively determine the mobile device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the behaviors are to be observed. Such behavior monitoring and analysis operations may be performed continuously (or near continuously) in a mobile device without consuming an excessive amount of processing, memory, or energy resources of the mobile device by identifying hot application programming interfaces (APIs) and hot action patterns that are invoked or used most frequently by software applications of the mobile device and storing information regarding these hot APIs and hot action patterns separately and more efficiently. | 03-19-2015 |