Abstract:
Techniques for operating a security system are provided. An example method for operating a security system according to the disclosure includes monitoring interactions of an unauthorized party with a computing environment configured to simulate the server, generating synthetic content based on the unauthorized party's interactions with the computing environment, and configuring the security system to permit the unauthorized party to access the synthetic content responsive to the unauthorized party's interactions with the security system.
Abstract:
Techniques describe tagging visual data (e.g., image and/or video data) with wireless and sensor measurement information by a mobile device. Tagged visual data may be sent to a server, such as a crowdsourcing server. Techniques further describe receiving visual data from a device, wherein the visual data is tagged with information comprising source identifying information associated with an at least one signal emitting device, identifying at least one visual feature from the visual data, determining a coordinate on a map at which the visual data was acquired based on identifying the at least one visual feature from the visual data, and associating the coordinate on the map with the information associated with the at least one signal emitting device.
Abstract:
Methods and devices are described for providing localized secure navigation in conjunction with near field communication access control systems. In one potential embodiment, a mobile device such as a cell phone may communicate with a door access control point using near field communication to receive location access system information. The mobile device may then authorize download and execution of a local secure navigation module from a location access system using the location access system information for use in receiving location assistance data, based on an authentication level associated with the mobile device. Such location assistance data may be used by the local secure navigation module to provide location assistance when the mobile device is in a secure location. The location of the mobile device may then be tracked using at least the location assistance data and the communication with the door access control point.
Abstract:
Systems, apparatus and methods disclosed herein facilitate vision based mobile device location determination. In some embodiments, a method for estimating a position of a mobile device may comprise: detecting that the mobile device is in communication with at least one of a plurality of devices, where each of the plurality of devices associated with a corresponding device identifier. The capture of at least one image by an image sensor coupled to the mobile device may be triggered, based, in part on: the device identifier corresponding to the device in communication with the mobile device, and/or a field of view of the image sensor. A location of the mobile device may then be determined, based, in part, on the at least one captured image.
Abstract:
In one implementation, a method may comprise: determining a topological representation of an indoor portion of a building based, at least in part, on positions or number of lines in an image of the indoor portion of the building; and comparing the topological representation to one or more stored topological representations, for example in a digital map of the building, to determine a potential position of the indoor portion of the building.
Abstract:
Embodiments disclosed obtain a plurality of measurement sets from a plurality of sensors in conjunction with the capture of a sequence of exterior and interior images of a structure while traversing locations in and around the structure. Each measurement set may be associated with at least one image. An external structural envelope of the structure is determined from exterior images of the structure and the corresponding outdoor trajectory of a UE. The position and orientation of the structure and the structural envelope is determined in absolute coordinates. Further, an indoor map of the structure in absolute coordinates may be obtained based on interior images of the structure, a structural envelope in absolute coordinates, and measurements associated with the indoor trajectory of the UE during traversal of the indoor area to capture the interior images.
Abstract:
Techniques describe opportunistically capturing and tagging images with wireless information by a mobile device. The tagged image may be transmitted to a remote server, such as a crowdsourcing server, where the location at which the image was captured may be determined using visual features from the image. An association between the location and the wireless measurements may be used in building/maintaining a heatmap. In one embodiment, techniques are described for setting camera parameters for opportunistically capturing images and may include receiving at least one signal associated with at least one signal emitting device, determining information associated with the at least one signal emitting device using the at least one signal, setting at least one camera parameter for a camera coupled to the mobile device based on the information associated with the at least one signal emitting device, and capturing one or more images using the at least one camera parameter.
Abstract:
Techniques for position estimation, e.g., of a mobile communication device, using trajectory are described herein. A method for estimating position of a mobile device described herein includes obtaining a routing graph corresponding to an area, wherein the routing graph indicates traversable paths through the area; collecting trajectory information corresponding to movement of the mobile device through the area; forming a trajectory graph from the trajectory information; comparing the trajectory graph to at least one subset of the routing graph to determine at least one matching subset of the routing graph; and estimating the position of the mobile device based at least in part on the at least one matching subset of the routing graph.
Abstract:
Method, device, and computer program product, for augmenting metadata for a mapped location is described. Mapped location trajectory data for each of a plurality of mobile devices is received. Purchase transaction data for the respective mobile device at the mapped location is received from each of the respective mobile devices. The purchase transaction data is correlated with the mapped location trajectory data to determine a purchased product location within the mapped location. The metadata for the mapped location is augmented to include the purchased product location.
Abstract:
Methods and devices are described for providing localized secure navigation in conjunction with near field communication access control systems. In one potential embodiment, a mobile device such as a cell phone may communicate with a door access control point using near field communication to receive location access system information. The mobile device may then authorize download and execution of a local secure navigation module from a location access system using the location access system information for use in receiving location assistance data, based on an authentication level associated with the mobile device. Such location assistance data may be used by the local secure navigation module to provide location assistance when the mobile device is in a secure location. The location of the mobile device may then be tracked using at least the location assistance data and the communication with the door access control point.