摘要:
Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.
摘要:
Technologies are generally described for providing location information associated with users for emergency service purposes. User location through a wireless communication device may be determined upon triggering by a user initiated emergency communication (in various modalities) or by an external trigger signal employing one or more known signal sources and provided to an emergency service provider. The user location may also be determined/updated periodically and refined upon triggering of the emergency communication. Communication between the user's wireless device and the emergency service provider may be prioritized, in some examples, to ensure reliable communication.
摘要:
Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.
摘要:
Location of a communication network subscriber is determined employing confidence metrics such as remote vs. local computer usage, primary user in a multi-user computing environment, likelihood of forgery, and comparable ones. A fine-grained location determination is then made based on the metric results and directory information for the particular subscriber such that services like emergency services can be provided with accurate location information.