Abstract:
Concepts and technologies disclosed herein are directed to wireless network enhancements via inductance loops as antennas. According to one aspect disclosed herein, a roadside system can measure inductance of an inductance loop associated with a road. The roadside system can determine whether the inductance of the inductance loop is greater than a baseline. If the inductance of the inductance loop is greater than the baseline, the roadside system can determine that a vehicle is positioned over the inductance loop and can utilize the inductance loop to activate a roadside area network. The roadside system can connect a user device to the roadside system via the roadside area network. The roadside system can include a connection to a network via a backhaul to enable communication between the user device and the network.
Abstract:
Methods and apparatus for providing access to a service are disclosed. An example apparatus includes at least one processor, and memory including machine readable instructions that, when executed, cause the at least one processor to perform operations including, in response to receipt of a first network communication, retrieve a first list identifying multicast group memberships of a device existing at a first time, the first list retrieved from a storage device based on an identifier in the first network communication, the first network communication including a second list identifying multicast group memberships of the device existing at a second time later than the first time. The device is authenticated based on a comparison of the first list to the second list. A second network communication is transmitted indicating the device has been authenticated in response to the authentication.
Abstract:
Example methods, apparatus, systems, and computer-readable storage media are provided to sense and protect against liquid in contact with a mobile electronic device. An example method includes determining, with one or more of a plurality of liquid sensors, that liquid has come into contact with at least one of an internal surface of a mobile electronic device and an external surface of a mobile electronic device. In response to the determining that liquid has come into contact with the at least one of an internal surface of a mobile electronic device and an external surface of a mobile electronic device, the method includes informing a user of the mobile electronic device that the mobile electronic device has come into contact with the liquid, and sealing a port of the mobile electronic device.
Abstract:
Methods and apparatus to electronically tag a circuit pair are disclosed herein. Example methods include generating circuit identifying information to be included in a tag, transmitting the circuit identifying information to a first network element and to a portable circuit probe, and electronically tagging the circuit pair by applying a tone to the circuit pair at the first network element. In some examples, the tone is encoded to include the tag. Example methods additionally include notifying the portable circuit probe that the circuit pair has been electronically tagged. In some examples, the tag is transmitted to the first network element via the circuit pair and, if the first network element fails to acknowledge receipt of the circuit identifying information, via an out-of-band network.
Abstract:
Methods and apparatus to electronically tag a circuit pair are disclosed herein. Example methods include generating circuit identifying information to be included in a tag, transmitting the circuit identifying information to a first network element and to a portable circuit probe, and electronically tagging the circuit pair by applying a tone to the circuit pair at the first network element. In some examples, the tone is encoded to include the tag. Example methods additionally include notifying the portable circuit probe that the circuit pair has been electronically tagged. In some examples, the tag is transmitted to the first network element via the circuit pair and, if the first network element fails to acknowledge receipt of the circuit identifying information, via an out-of-band network.
Abstract:
Methods and apparatus for providing access to a service are disclosed. An example method includes analyzing a received request to verify a requesting device, the received request identifying multicast group memberships of the requesting device. Access is provided to the service in response to verifying the requesting device using the multicast group memberships.
Abstract:
Example methods, apparatus, systems, and computer-readable storage media are provided to monitor a mobile device. An example method includes determining whether environmental condition data collected by a plurality of sensors of a mobile device complies with an environmental condition rule comprising thresholds associated with the environmental condition data. The environmental condition data is representative of external elements detected by the sensors. The example method includes informing a user of the mobile device of an environmental condition associated with the environmental condition data when the environmental condition data does not comply with the environmental condition rule. The example method includes performing a self-protecting procedure via the mobile device. The self-protecting procedure defined in the environmental condition rule is to protect the mobile device from the environmental condition when the environmental condition data does not comply with the environmental condition rule.
Abstract:
Aspects of the subject disclosure may include, for example, a device comprising: a female port configured to receive a data connector, the data connector comprising a surface with a first opening; a first movable member disposed within the female port, the first movable member being configured such that as the data connector is moved into the female port a first portion of the first movable member enters into the first opening; and a first blocking member disposed within the female port, the first blocking member being configured to move to a first blocking position to block the first portion of the first movable member from exiting the first opening after the first portion of the first movable member has entered the first opening. Other embodiments are disclosed.
Abstract:
The disclosed technology is directed towards facilitating communication with an unknown person via a device of the person having an unknown communications address. The presence of a visible person at a location can be determined, and a communications device at or near that location can be detected as a candidate device associated with that person. The device's current location, which can be regularly registered along with its communication address, is matched to the person's visible location. Communication via the device, such as by a responder, whether with the person and/or to obtain information from the device, is based on the registered communication address. The person's identity and other data may be obtainable. For a non-visible person, e.g., underneath an obstruction, the location of a detected device predicts the likely presence of a person near that location. A map may be generated showing locations of multiple detected devices.
Abstract:
The disclosed technology is directed towards presenting communications data to a responding entity that are relevant to an emergency situation at an emergency location. The communications data can be obtained from communications (e.g., text messages, transmitted video, voice calls and the like) that involve at least one user device at the situation, including communications that do not involve the responding entity. Users may opt in to such an emergency service to allow access to their communications, whereby their device locations are tracked and known in the event of an emergency. Upon obtaining the communications data, a responder can receive a view of the scene augmented with the communications data. The view can include a three-dimensional and/or two-dimensional representation of the zone/area of the emergency situation. Filtering can be used to eliminate irrelevant communications, and summarization can be used to combine generally redundant communications.