摘要:
A computer program product has a computer-readable storage medium having computer program instructions embodied therein for performing a method for implementing a privacy policy for a user. The method may include the user developing rules that determine whether another user (requester) can access information related to the user. The rules may be stored in a database coupled to a server and evaluated when a request is received from the requester to access the information. If a rule is satisfied by the requester, the server can return the information to the requester. The information can be returned at a level of granularity specified by the user in the satisfied rule. A privacy level can be set by the user to allow access to requesters based on the rules or to deny access to any requesters.
摘要:
The invention pertains to location approximation of devices, e.g., wireless access points and client devices in a wireless network. Location estimates may be obtained by observation/analysis of packets transmitted or received by the access point. For instance, data rate information associated with a packet is used to approximate the distance between a client device and the access point. This may be coupled with known positioning information to arrive at an approximate location for the access point. Confidence information and metrics about whether a device is an access point and the location of that device may also be determined. Accuracy of the location determination may be affected by factors including propagation and environmental factors, transmit power, antenna gain and diversity, etc. A location information database of access points may employ measurements from various devices over time. Such information may identify the location of client devices and provide location-based services to them.
摘要:
Systems and methods according to aspects of the invention verify requests for information over a network. Computing devices communicating over a network transmit numerous signals with various types of information including spatial information, temporal information, device-specific information, and transmission specific information. This information may be used to generate statistical records of valid request for information. Various combinations of these signals may be used to determine whether a request for information is a valid request based on the statistical records associated with the signals. Where a request for information has been verified, the system and method may provide the information. Where the request for information has not been verified, the system and method may deny the request for information. Thus the system and method may be used to prevent and block scraping and spamming attacks.
摘要:
A computer-implemented method and system of building a user reputation database for use in a user location data system. The method and system receive user location information containing personally identifiable data of a user and user position data. The user position data may or may not represent one or more actual geographic positions of the user. The user location information is temporarily stored and analyzed to provide a spam score associated with the user position data indicative of whether the user position data represents the actual geographic positions of the user. Data indicative of the spam score is also provided to user reputation database to store a user reputation score associated with the user.
摘要:
A computer-implemented method and system of quarantining user location information receives from a user device user location information that includes personally identifiable user data and user position data associated with one or more geographic positions of the user. The user location information is temporarily stored in a quarantine data storage database for a predetermined quarantine time, during such time it can be used for various analyses. After the quarantine time, personally identifiable user data of the user location information is filtered out before the user position data is sent for long-term storage to a filtered data storage system.
摘要:
A computer-implemented method and system of building a user reputation database for use in a user location data system. The method and system receive user location information containing personally identifiable data of a user and user position data. The user position data may or may not represent one or more actual geographic positions of the user. The user location information is temporarily stored and analyzed to provide a spam score associated with the user position data indicative of whether the user position data represents the actual geographic positions of the user. Data indicative of the spam score is also provided to user reputation database to store a user reputation score associated with the user.
摘要:
A computer-implemented method is disclosed that includes receiving on a mobile device a search query associated with a geographic location, providing one or more search results in response to the search query, the search results each being associated with a geographic location, and presenting on a graphical display of the computing device icons corresponding to each search result and also corresponding to a key on the computing device.
摘要:
A system, method, and computer-readable medium for regulating data traffic between a client device and a server. The system determines whether a transmission of a data file is allowable based on pre-defined criteria. The system provides an indication of whether the transmission is allowable and under what conditions the transmission would be allowable. If the transmission of a data file is requested and the transmission is not allowable, a message is sent from the server to the client device that first pre-defined criteria are not met and the message indicates that the transmission of the data file will be allowed when second pre-defined criteria are met.
摘要:
A method of initiating a telecommunication session for a communication device include submitting to one or more telecommunication carriers a proposal for a telecommunication session, receiving from at least one of the one or more of telecommunication carriers a bid to carry the telecommunications session, and automatically selecting one of the telecommunications carriers from the carriers submitting a bid, and initiating the telecommunication session through the selected telecommunication carrier.
摘要:
A computer-implemented mapping method is disclosed and includes displaying a first map view of a geographic area on a display of a computing device, receiving a voice or key-press zoom command and generating a first zoom box of a predetermined size on the display relative to the first map view in response to the zoom command, and displaying a second map view of a zoomed geographic area corresponding to the zoom box.