Patent classifications
H04W4/025
METHOD FOR SECURING COMMUNICATION
A method for securing communication between at least two participants, each having an identification and a safeguard and communicate therewith, in encrypted form involves the participants exchanging exchange their identification. At least one of the participants communicates its position in addition to its identification to the other participant. The position of the participant being determined or queried by the other participant without any assistance on the part of the participant, the participant then validating the other participant based on a comparison of the communicated position and the determined or queried position.
ASSET TRACKING TECHNOLOGIES
Technologies for tracking the location of mobile assets include a tracking device mounted to an asset and radio-frequency identification tags installed or attached to static structures. The radio-frequency identification tags include identification data stored thereon. The identification data is associated with the installed location of the corresponding radio-frequency identification tags. The tracking device includes one or more transceivers configured to energize or trigger the radio-frequency identification tags and receive the stored identification data when the tracking device and asset are in proximity to the tags. The current location of the mobile asset is determined based on the identification data received from the radio-frequency identification tags.
System and method for optimal automated booking of on-demand transportation in multi-modal journeys
A method for automated booking of an on-demand service in a multimodal journey includes receiving information related to a multimodal trip plan for a commuter trip. The multimodal trip plan includes a plurality of segments, and the plurality of segments include an on-demand service segment that requires an on-demand service vehicle as the mode of transport. The method also includes receiving real-time information relating to a location of the commuter from one or more location tracking sensors, determining an estimated time of arrival of the commuter at a transfer point for transfer to the on-demand service segment by analyzing the real-time information, identifying a time of availability of an on-demand service vehicle at the transfer point (as a function of a time of booking), and determining an optimal time of booking of the on-demand service vehicle based on the estimated time of arrival and the time of availability.
Method and apparatus for acquiring location information of terminal through wireless communication system
The present embodiments relate to a method and an apparatus for acquiring location information of a terminal by using a wireless communication system. An embodiment provides an apparatus for measuring location information of a terminal, the apparatus comprising: at least one downlink signal receiver; at least one uplink signal receiver; and a controller for controlling the downlink signal receiver and the uplink signal receiver, wherein the controller configures uplink resource allocation information on the basis of control information received by the downlink signal receiver, and determines, on the basis of the uplink resource allocation information, whether to receive an uplink signal.
MOTION-BASED BEAM MANAGEMENT TECHNIQUES IN WIRELESS COMMUNICATIONS
Methods, systems, and devices for wireless communications are described that provide for a user equipment (UE) to detect motion of the UE based on a motion sensor, such as an inertial measurement unit (IMU). The UE, based on the detected motion, may trigger a measurement procedure in which measurements of different beams or cells are performed at a greater periodicity than if the motion were not detected. The indication from the motion sensor may indicate that UE acceleration, rotation, orientation, or any combinations thereof, exceeds a threshold and results in the UE switching to a fastest available measurement periodicity. After triggering the fastest available measurement periodicity, the UE may adjust the measurement periodicity based on newly obtained beam measurements and converge to a measurement periodicity based on observed metrics.
DEPLOYING NETWORKED EQUIPMENT BASED ON A DEPLOYMENT MODEL
The technologies described herein are generally directed toward deploying networked equipment based on a selected deployment model. According to an embodiment, a system can comprise a processor and a memory that can enable performance of operations including receiving a deployment request from a request source, for a deployment task comprising networked equipment to be deployed and a location for deployment of the networked equipment. The operations can further include querying a data source for deployment information implicating the location and the deployment task. Based on the request source, the deployment task, and the deployment information, the operations include selecting a deployment model to facilitate processing the deployment request. The operations additionally include, based on the deployment task and the deployment model, deploying the networked equipment at the location.
Clustering for K-anonymity in location trajectory data
An apparatus for providing anonymity in geographic data for probe devices in a geographic region for a location-based service includes at least a database, a clustering calculator and an anonymity controller. The database stores trajectory data based on sequences of sensor measurements of the probe devices. The clustering calculator clusters the trajectory data, according to a first iteration threshold, into clusters each defined by a cluster point and compares distance for a first cluster from the clusters to cluster points of other clusters of the clusters. The clustering calculator selects a second cluster from the clusters based on the comparison of distances and merges the first cluster and the second cluster into a merged cluster. The anonymity controller modifies the trajectory data to provide a predetermined level of anonymity to locations from the trajectory data in response to the merged cluster.
Pillar location for a mobile device
Techniques for pillar location for a mobile device are described, and may be implemented via a mobile device to identify frequently visited locations and to perform different tasks for the mobile device at the frequented locations. Generally, the described techniques enable a mobile device to generate precise representations of frequented locations known as “pillar locations” without relying on conventional location determination techniques. Further, specific actions can be performed when the mobile device is detected at a pillar location, such as automatically unlocking the mobile device from a locked state.
Authentication method, wearable device and mobile device
In an authentication method, a wireless communication is established between a mobile device and a wearable device. A proximity is detected between the mobile device and the wearable device by comparing mobile device position information and wearable device position information. Access to the mobile device is granted based on a detected proximity.
Theft detector
An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.