Abstract:
A method for synchronizing a wireless communication system is disclosed. A silence duration for a base station is determined based on the time required for a neighbor base station to obtain or maintain synchronization. All transmissions from the base station are ceased for the silence duration. Multiple base stations level may cease transmissions at the same time, thus mitigating interference.
Abstract:
The subject matter disclosed herein relates to a system and method for identification of points of interest within a predefined area. Location estimates for substantially stationary mobile devices may be utilized to determine locations of one or more points of interest. Location estimates for mobile devices in motion may be utilized to determine locations of one or more corridors.
Abstract:
Methods, systems and devices for communicating behavior analysis information using an application programming interface (API) may include receiving via the API a request to register the second module to access an operation of a behavioral monitoring system of the mobile computing device, and exchanging authentication information between the first module and the second module to accomplish mutual authentication. Aspects may include receiving via the API a request for version identification information that may be used by the server to determine how to interpret, evaluate, or crowd-source information, and exchanging version identification information between the first module and the second module to cause the second module to send the information to the server. Aspects may further include receiving via the API a provision malware model request including a command causing the first module to send a malware or classifier model to a behavioral monitoring system of the mobile computing device.
Abstract:
Methods and apparatuses are provided which may be implemented in various devices to provide navigation assistance data and/or the like to a mobile station with regard to at least one of a plurality of different indoor regions. For example, a computing platform of a map inference device may establish encoded metadata for at least a portion of an indoor region based, at least in part, on an electronic map, an access point locator, or some combination thereof, and provide such encoded metadata to a repository device that may provide at least a portion of the encoded metadata to a mobile station.
Abstract:
Methods and apparatuses are provided which may be implemented in various devices for to determine or assist in determining that a mobile station is at one or more particular indoor regions and to provide positioning assistance data and/or the like to the mobile station with regard to at least the one or more particular indoor regions.
Abstract:
Methods and apparatuses are provided which may be implemented in various devices for to determine or assist in determining that a mobile station is at one or more particular indoor regions and to provide positioning assistance data and/or the like to the mobile station with regard to at least the one or more particular indoor regions.
Abstract:
Methods and apparatuses are provided that may be implemented in a mobile device to determine that the mobile device is located within a particular level of a multi-level physical structure based, at least in part, on a comparison of measured wireless signals and stored measurements of wireless signals.
Abstract:
Systems and methods for recognizing and reacting to malicious or performance-degrading behaviors in a mobile device include observing mobile device behaviors in an observer module within a privileged-normal portion of a secure operating environment to identify a suspicious mobile device behavior. The observer module may generate a concise behavior vector based on the observations, and provide the vector to an analyzer module in an unprivileged-secure portion of the secure operating environment. The vector may be analyzed in the unprivileged-secure portion to determine whether the mobile device behavior is benign, suspicious, malicious, or performance-degrading. If the behavior is found to be suspicious, operations of the observer module may be adjusted, such as to perform deeper observations. If the behavior is found to be malicious or performance-degrading behavior the user and/or a client module may be alerted in a secure, tamper-proof manner.
Abstract:
Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal.
Abstract:
Described are devices, methods, techniques and systems for locating a portable services access transceiver (PSAT) for use in aiding emergency “911” services. In one implementation, one or more conditions indicative of movement of a PSAT may initiate a process for obtaining a new estimated location of the PSAT. In another implementation, a location of a PSAT may be determined or updated using indoor navigation techniques.