Abstract:
Methods and apparatuses to assist a global positioning system (GPS) module to determine GPS position estimates for a wireless communication device is disclosed. Processing circuitry in the wireless communication device determines a potential or an actual inaccuracy in a GPS position estimate obtained from a GPS module. The processing circuitry obtains a set of map vector data stored in or associated with the wireless communication device. The processing circuitry determines a location estimate of the wireless communication device based on at least a portion of the set of map vector data. The processing circuitry provides the location estimate to the GPS module and obtains an updated GPS position estimate from the GPS module, the updated GPS position estimate based at least in part on the location estimate provided to the GPS module.
Abstract:
Systems, methods, and computer program products for determining the location and direction of travel of a mobile device using map vector constraints is disclosed.
Abstract:
An access control system is provided to prevent the surreptitious granting of access to privacy related functionality on an electronic device. Software-based events to grant access to device functionality can be validated by confirming that the software event corresponds with a hardware input event. This validation prevents the spoofing of a user interface input that may be used to fraudulently grant access to specific functionality.
Abstract:
Described herein are techniques to enable limited access to a photos library by enabling application specific virtual photo libraries. When an application requests access to the photos library, the user can select an option to enable or configure a virtual photos library, and then select specific assets (e.g., photos, videos) within the photos library to be selected for inclusion into an application specific virtual photos library.
Abstract:
An application manager of a mobile device can provide a user with the ability to control whether an application can use location information provided by a location subsystem of the mobile device. The application can request to be notified by the location subsystem when the mobile device crosses a geofence. When the mobile device crosses the geofence, the location subsystem provides a notice to the application. The application manager can intercept the notice to the application, and present an alert on a user interface. The application manager can then provide the notice to the application only upon receiving an input through the user interface confirming that the application still has permission to use location information.
Abstract:
A location-aware device detects if a personal or point of interest region has been entered or exited and a current context of the device. In response, an operating mode is selected based on the region and a current context of the device. The operating mode is configurable by a user, including setting geofence parameters, context parameters and operating mode parameters.
Abstract:
This disclosure describes embodiments for harvesting and serving labels for locations. In an embodiment, a method comprises: receiving, by one or more server computers, location data including wireless access point data and location labels associated with significant locations, the location data being harvested from a plurality of devices operating at a plurality of geographic locations; and updating, by the one or more server computers, a plurality of fingerprints representing the plurality of geographic locations, the updating including associating at least one of the received location labels with at least one of the plurality of fingerprints.
Abstract:
Described are a system and technique for collecting stack trace information of devices and analyzing this information to provide metrics with respect to memory usage. The memory analysis includes attributing the memory usage to particular development components by traversing a stack trace. For example, the development components may correspond to a classification used for a particular development effort such as a group of classes, a sub-project, or a development team. As a result, the system may produce various metrics that produce memory usage information attributable to a more meaningful conceptual unit rather than, for example, function names. Accordingly, these attributions may be analyzed for forensic purposes to get a more meaningful picture of sources and causes of memory usage.
Abstract:
Techniques for location source control for paired devices are described. Location source control selects a location source for a mobile device. The mobile device can receive, from an application program, a request for determining a location of the mobile device. The mobile device can determine a first location estimate using a location subsystem of the mobile device. The mobile device can determine whether to provide the first location estimate as input to the application program, or to provide a second location estimate as input to the application program. The second location estimate can be an estimated location of the companion device and determined by the companion device.
Abstract:
Methods, systems, and computer program products for a mobile device determining its location based on a location of a companion device are described. A mobile device can receive a request for determining a location of the mobile device from an application. The request can include an accuracy specification providing a lower limit on accuracy of the determined location. The mobile device can determine that the mobile device is incapable of achieving that accuracy. The mobile device can then submit a location request to a companion device that has paired with the mobile device. The companion device, upon receiving the location request, can determine a location of the companion device and provide the location of the companion device to the mobile device. The mobile device can then designate the location of the companion device as the location of the mobile device, and provide the location to the application.