WO2012087576A4 - Unauthorized location detection and countermeasures - Google Patents

Unauthorized location detection and countermeasures Download PDF

Info

Publication number
WO2012087576A4
WO2012087576A4 PCT/US2011/063767 US2011063767W WO2012087576A4 WO 2012087576 A4 WO2012087576 A4 WO 2012087576A4 US 2011063767 W US2011063767 W US 2011063767W WO 2012087576 A4 WO2012087576 A4 WO 2012087576A4
Authority
WO
WIPO (PCT)
Prior art keywords
mobile device
instructions
location
locate
events
Prior art date
Application number
PCT/US2011/063767
Other languages
French (fr)
Other versions
WO2012087576A1 (en
Inventor
Frederic A. BECKLEY
Robert J. Anderson
Matthew L. Ward
Original Assignee
Trueposition, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Trueposition, Inc. filed Critical Trueposition, Inc.
Priority to JP2013546186A priority Critical patent/JP2014509415A/en
Priority to CN2011800609616A priority patent/CN103270496A/en
Priority to EP11850974.4A priority patent/EP2656220A4/en
Priority to MX2013007174A priority patent/MX2013007174A/en
Priority to KR1020137019276A priority patent/KR20140004141A/en
Priority to CA2818904A priority patent/CA2818904A1/en
Priority to BR112013016172A priority patent/BR112013016172A2/en
Priority to AU2011349824A priority patent/AU2011349824B2/en
Publication of WO2012087576A1 publication Critical patent/WO2012087576A1/en
Publication of WO2012087576A4 publication Critical patent/WO2012087576A4/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring

Abstract

A location sentry system is provided for use within a mobile device. The sentry system can be configured to detect unauthorized attempts to locate mobile devices by monitoring messages passed between the mobile device and the wireless network and/or messages passed between components of the mobile device, and determining that one or more of the messages is/are indicative of an attempt to locate the mobile device. In response to a determination that an unauthorized attempt has been detected, the location sentry can be configured to take one or more actions. For example, the location sentry system could prevent location information from being sent back to the wireless network and/or the location sentry system could cause incorrect information to be sent to the wireless network.

Claims

AMENDED CLAIMS Received by the International Bureau on 22.06.2012 (22.06.2012)
1. A mobile device operable to communicate with a wireless network and configured to detect unauthorized location attempts, comprising:
a processor; and
a memory coupled to the processor, the memory including instructions that upon execution cause the processor to execute an operational procedure, the memory comprising: instructions for identifying a sequence of events that includes an event indicating that a location subsystem of the mobile device was activated;
instructions for determining that the sequence of events is indicative of an unauthorized attempt to locate the mobile device; and
instructions for logging the sequence of events as an unauthorized attempt to locate the mobile device.
2. The mobile device of claim 1, wherein the instructions for determining that the sequence of events is indicative of an unauthorized attempt to locate the mobile device further comprise: instructions for determining that the sequence of events includes an event indicating that location information was placed in an outgoing message queue.
3. The mobile device of claim 1, wherein the instructions for determining that the sequence of events is indicative of an unauthorized attempt to locate the mobile device further comprise: instructions for determining that the sequence of events includes an event indicating that a global positioning system receiver of the mobile device was activated.
4. The mobile device of claim 1, wherein the instructions for determining that the sequence of events is indicative of an unauthorized attempt to locate the mobile device further comprise: instructions for determining that the sequence of events includes an event indicating that the mobile device entered into a scanning mode for receiving beacon timing information from a plurality of base stations.
5. The mobile device of claim I, wherein the instructions for determining that the sequence of events is indicative of an unauthorized attempt to locate the mobile device further comprise: instructions for determining that the sequence of events includes an event indicating that a request for location information was received from the wireless network.
6. The mobile device of claim 1, wherein the instructions for determining that the sequence of events is indicative of an unauthorized attempt to locate the mobile device further comprise: instructions for determining that the sequence of events includes an event indicating that a program executing on the mobile device requested to access the location subsystem; and instructions for determining that the program is not authorized to access the location subsystem.
7. The mobile device of claim 6, wherein the program is a program stored on a SIM card.
8. The mobile device of claim 1, wherein the instructions for determining that the sequence of events is indicative of an unauthorized attempt to locate the mobile device further comprise: instructions for determining that the sequence of events includes an event indicating that data used to assist in a location calculation was received from a wireless network.
9. The mobile device of claim 1, wherein the instructions for determining that the sequence of events is indicative of an unauthorized attempt to locate the mobile device further comprise: instructions for determining that the sequence of events includes an event indicating that the mobile device transitioned from an idle mode to an active mode.
10. The mobile device of claim 1, wherein the memory further comprises:
instructions for displaying an alert indicating that an unauthorized attempt to locate the mobile device was identified.
1 1. The mobile device of claim 1 , wherein the memory further comprises: instructions for sending an error message to the wireless network indicating that the mobile device cannot support a location attempt.
12. The mobile device of claim 1, wherein the memory further comprises:
instructions for sending a message to the wireless network that indicates that the mobile device does not include a location subsystem.
13. The mobile device of claim 1, wherein the memory further comprises:
instructions for sending inaccurate location information to the wireless network.
14. The mobile device of claim 1, wherein the memory further comprises:
instructions for sending location information for a default location to the wireless network.
15. The mobile device of claim 1, wherein the memory further comprises:
instructions for sending location information for a previous location to the wireless network.
16. The mobile device of claim 1, wherein the memory further comprises:
instructions for sending inaccurate satellite measurement information to the wireless network.
17. The mobile device of claim 1, wherein the memory further comprises:
instructions for sending inaccurate location related signal measurement data to the wireless network.
18. The mobile device of claim 1, wherein the memory further comprises:
instructions for sending a cell-ID identifier randomly selected from a group of active set cells to the wireless network.
19. The mobile device of claim 1, wherein the memory further comprises:
instructions for sending identifiers for a subset of detected beacon signals to the wireless network.
20. The mobile device of claim 1, wherein the memory further comprises: instructions for sending information to the wireless network indicating that satellite coverage is inadequate to receive satellite signals.
21. The mobile device of claim 1, wherein the memory further comprises:
instructions for a receiver-location sentry client application that encapsulates an application program interface for a wireless receiver, wherein the receiver-location sentry client application is configured to analyze incoming messages received by the wireless receiver;
instructions for a transmitter-location sentry client application that encapsulates an application program interface for a wireless transmitter, wherein the transmitter-location sentry client application is configured to analyze messages placed into an outgoing queue for transmission to the wireless network; and
instructions for a location-subsystem-location sentry client application that encapsulates an application program interface for the location subsystem, wherein the location-subsystem- location sentry client application is configured to analyze messages sent to location subsystem.
22. The mobile device of claim 1, wherein the memory further comprises:
instructions for running an operating system for the mobile device within a virtualization environment, wherein the virtualization environment is configured to monitor messages received by the wireless receiver, messages placed into an outgoing queue for transmission to the wireless network, and messages sent to location subsystem for messages indicative of attempts to locate the mobile device.
23. The mobile device of claim 1, wherein the memory further comprises:
instructions for a wireless receiver application program interface, wherein the wireless receiver application program interface is configured to monitor incoming messages for messages that include location requests and/or messages that include data used to assist in a location calculation;
instructions for a wireless transmitter application program interface, wherein the wireless transmitter application program interface is configured to monitor outgoing messages for messages that include location information; and instructions for a location subsystem application program interface, wherein the location subsystem application program interface is configured to monitor messages sent to the location subsystem for unauthorized attempts to activate the location subsystem.
24. A computer-readable storage medium including a location sentry system for use in a mobile device, the computer-readable storage medium comprising:
instructions for logging a group of events in a database of the mobile device;
instructions for detecting, in the group of events, an event indicating that location information was placed in an outgoing message queue for transmission to a base station;
instructions for determining that the sequence of events is indicative of an unauthorized attempt to locate the mobile device; and
instructions for logging the group of events as an attempt to locate the mobile device wherein the instructions for determining that the group of events is indicative of an unauthorized attempt to locate the mobile device further comprise at least one of: (a) instructions for determining that an event is present within the group of events that indicates that a location subsystem was accessed; (b) instructions for determining that an event is present within the group of events that indicates that a global positioning system receiver of the mobile device was activated; and (c) instructions for determining that an event is present within the group of events that indicates that the mobile device entered into a scanning mode for receiving beacon timing information from a plurality of base stations.
25. The computer-readable storage medium of claim 24, wherein the instructions for determining that the group of events is indicative of an unauthorized attempt to locate the mobile device further comprise:
instructions for determining that an event is present within the group of events that indicates that a location subsystem was accessed.
26. The computer-readable storage medium of claim 24, wherein the instructions for determining that the group of events is indicative of an unauthorized attempt to locate the mobile device further comprise:
instructions for determining that an event is present within the group of events that indicates that a global positioning system receiver of the mobile device was activated.
27. The computer-readable storage medium of claim 24, wherein the instructions for determining that the group of events is indicative of an unauthorized attempt to locate the mobile device further comprise:
instructions for determining that an event is present within the group of events that indicates that the mobile device entered into a scanning mode for receiving beacon timing information from a plurality of base stations.
28. The computer-readable storage medium of claim 24, wherein the instructions for determining that the group of events is indicative of an unauthorized attempt to locate the mobile device further comprise:
instructions for determining that an event is present within the group of events that indicates that a request for location information was received.
29. The computer-readable storage medium of claim 24, wherein the instructions for determining that the group of events is indicative of an unauthorized attempt to locate the mobile device further comprise:
instructions for determining that an event is present within the group of events that indicates that an unauthorized program executing on the mobile device attempted to access the location subsystem.
30. The computer-readable storage medium of claim 24, wherein the instructions for determining that the group of events is indicative of an unauthorized attempt to locate the mobile device further comprise:
instructions for determining that an event is present within the group of events that indicates that data used to assist in a location calculation was received from a wireless network.
31. The computer-readable storage medium of claim 24, wherein the instructions for determining that the group of events is indicative of an unauthorized attempt to locate the mobile device further comprise:
instructions for determining that an event is present within the group of events that indicates that the mobile device transitioned from an idle mode to an active mode.
32. The computer-readable storage medium of claim 24, further comprising:
instructions for displaying an alert indicating that an attempt to locate the mobile device was detected.
33. The computer-readable storage medium of claim 24, further comprising:
instructions for removing the location information from the outgoing message queue.
34. The computer-readable storage medium of claim 24, further comprising:
instructions for sending an error message to the network responsive to the determination that the group of events is indicative of an unauthorized attempt to locate the mobile device.
35. The computer-readable storage medium of claim 24, further comprising:
instructions for sending a message to the network that indicates that the mobile device does not include a location subsystem responsive to the determination that the group of events is indicative of an unauthorized attempt to locate the mobile device.
36. The computer-readable storage medium of claim 24, further comprising:
instructions for replacing the location information with inaccurate location information responsive to the determination that the group of events is indicative of an unauthorized attempt to locate the mobile device.
37. The computer-readable storage medium of claim 24, further comprising:
instructions for replacing the location information with default location information responsive to a determination that the group of events is indicative of an unauthorized attempt to locate the mobile device.
38. The computer-readable storage medium of claim 24, further comprising:
instructions for sending location information for a previous location to a wireless network responsive to the determination that the group of events is indicative of an unauthorized attempt to locate the mobile device.
39. The computer-readable storage medium of claim 24, further comprising:
instructions for sending inaccurate satellite measurement information to a wireless network responsive to the determination that the group of events is indicative of an unauthorized attempt to locate the mobile device.
40. The computer-readable storage medium of claim 24, further comprising: instructions for sending inaccurate location related signal measurement data to a wireless network responsive to the determination that the group of events is indicative of an unauthorized attempt to locate the mobile device.
41. The computer-readable storage medium of claim 24, further comprising:
instructions for sending a cell-ID identifier randomly selected from a group of active set cells to a wireless network responsive to the determination that the group of events is indicative of an unauthorized attempt to locate the mobile device.
42. The computer-readable storage medium of claim 24, further comprising:
instructions for sending identifiers for a subset of detected beacon signals to a wireless network responsive to the determination that the group of events is indicative of an unauthorized attempt to locate the mobile device.
43. The computer-readable storage medium of claim 24, further comprising:
instructions for sending information that indicates inadequate satellite coverage to a wireless network responsive to the determination that the group of events is indicative of an unauthorized attempt to locate the mobile device.
44. The computer-readable storage medium of claim 24, further comprising:
instructions for a receiver-module that encapsulates an application program interface for a wireless receiver, wherein the receiver-module is configured to analyze incoming messages for requests for location information and/or data used to assist in a location calculation;
instructions for a transmitter-module that encapsulates an application program interface for a wireless transmitter, wherein the transmitter-module is configured to analyze messages placed into an outgoing queue for unauthorized attempts to transmit location information; and instructions for a location-subsystem-module that encapsulates an application program interface for the location subsystem, wherein the location-subsystem-module is configured to analyze messages for unauthorized attempts to access the location subsystem.
45. The computer-readable storage medium of claim 24, further comprising:
40 instructions for running an operating system for the mobile device within a virtualization environment, wherein the virtualization environment is configured to analyze messages received by the wireless receiver, messages placed into an outgoing queue for transmission to a wireless network, and messages sent to location subsystem for messages indicative of unauthorized attempts to locate the mobile device.
46. The computer-readable storage medium of claim 24, further comprising:
instructions for a wireless receiver application program interface, wherein the wireless receiver application program interface is configured to monitor incoming messages for messages that include location requests and/or messages that include data used to assist in a location calculation;
instructions for a wireless transmitter application program interface, wherein the wireless transmitter application program interface is configured to monitor outgoing messages for unauthorized attempts to transmit location information; and
instructions for a location subsystem application program interface, wherein the location subsystem application program interface is configured to monitor for unauthorized attempts to activate the location subsystem.
47. A location sentry method for use in a mobile device, comprising:
analyzing, by a first location sentry module encapsulating a wireless receiver application program interface, message traffic for messages indicative of requests for location information; and
displaying an alert on a user interface of the mobile device indicating that an
unauthorized attempt to locate the mobile device was detected in response to detecting a message indicative of a request for location information.
48. A location sentry method for use in a mobile device, comprising:
analyzing, by a first location sentry module encapsulating a wireless receiver application program interface, message traffic for messages indicative of requests for location information; and
displaying an alert on a user interface of the mobile device indicating that an
unauthorized attempt to locate the mobile device was detected in response to detecting a message
41 indicative of a request for location information; and further comprising:
analyzing, by a second location sentry module encapsulating an application program interface that interfaces a location subsystem with the operating system, attempts to access the location subsystem for unauthorized attempts to access the location subsystem; and
displaying the alert on a user interface of the mobile device indicating that an attempt to locate the mobile device was detected in response to detecting that an unauthorized program accessed the location subsystem.
42
49. A location sentry method for use in a mobile device, comprising:
analyzing, by a first location sentry module encapsulating a wireless receiver application program interface, message traffic for messages indicative of requests for location information; and
displaying an alert on a user interface of the mobile device indicating that an unauthorized attempt to locate the mobile device was detected in response to detecting a message indicative of a request for location information; and further comprising:
analyzing, by a third location sentry module encapsulating a wireless transmitter application program interface, messages placed within an outgoing message queue for the wireless transmitter for unauthorized attempts to transmit location information; and
displaying the alert on a user interface of the mobile device indicating that an unauthorized attempt to locate the mobile device was detected in response to detecting a message within the outgoing message queue that includes location information that was sent by an unauthorized program.
50. A mobile device configured to detect unauthorized location attempts, comprising:
means for emulating a wireless radio transmitter subsystem for a wireless receiver configured to receive messages from a wireless radio transmitter subsystem for transmission to a wireless network and analyze the messages for attempts to transmit location information to a wireless network; and
means for causing an alert to be displayed on a user interface responsive to a
determination that an attempt to transmit location information was detected.
51. The mobile device of claim 50, further comprising:
means for emulating a location subsystem configured to receive a request to access the location subsystem; and
means for determining that the request is indicative of an attempt to locate the mobile device.
52. The mobile device of claim 50, further comprising:
43 means for emulating a wireless receiver subsystem configured to receive a message including a request for location information; and
means for determining that the message is indicative of an attempt to locate the mobile device.
53. A computer-readable medium for use in a mobile device including a location sentry configured to detect unauthorized attempts to locate the mobile device, comprising:
44 instructions for a location subsystem application program interface configured to receive requests to access the location subsystem and monitor the requests for unauthorized attempts to access the location subsystem; and
instructions for displaying an alert on a user interface in response to detecting an unauthorized attempt to access the location subsystem.
54. A computer-readable medium for use in a mobile device including a location sentry configured to detect unauthorized attempts to locate the mobile device, comprising:
instructions for a location subsystem application program interface configured to receive requests to access the location subsystem and monitor the requests for unauthorized attempts to access the location subsystem; and
instructions for displaying an alert on a user interface in response to detecting an unauthorized attempt to access the location subsystem; and further comprising:
instructions for a wireless receiver subsystem application program interface configured to receive messages from the wireless receiver subsystem and monitor the messages for location information requests; and
wherein the instructions for the wireless receiver subsystem application program interface are further configured to determine that location information requests are indicative of attempts to locate the mobile device.
55. A computer-readable medium for use in a mobile device including a location sentry configured to detect unauthorized attempts to locate the mobile device, comprising:
instructions for a location subsystem application program interface configured to receive requests to access the location subsystem and monitor the requests for unauthorized attempts to access the location subsystem; and
instructions for displaying an alert on a user interface in response to detecting an unauthorized attempt to access the location subsystem; and further comprising:
instructions for a wireless transmitter subsystem application program interface configured to monitor messages from applications for messages including location information; and
45 wherein the instructions for the wireless transmitter subsystem application program interface are further configured to determine that messages including location information are indicative of attempts to locate the mobile device.
56. A mobile device configured to operate within a wireless network and configured to detect unauthorized attempts to locate the mobile device, comprising:
a processor; and
a memory coupled to the processor, wherein the memory includes instructions that upon execution cause the processor to:
detect an unauthorized attempt to locate the mobile device; and
send incorrect information to the wireless network in response to the detection of the unauthorized attempt to locate the mobile device.
57. The mobile device of claim 56, wherein the incorrect information includes coordinates for a default location, a previous location, or an inaccurate location.
46
58. The mobile device of claim 56, wherein the incorrect information includes information reporting inadequate satellite coverage, degraded satellite broadcast measurements, previous satellite broadcast measurements, or preset satellite broadcast measurements.
59. The mobile device of claim 56, wherein the incorrect information includes information that indicates that the mobile device cannot support the request.
60. The mobile device of claim 56, wherein the incorrect information includes information that identifies a subset of detected beacon signals or degraded beacon signal strength information.
47

STATEMENT UNDER PCT ARTICLE 19

Dear Sir/Madam:

This reply is responsive to the International Search Report and Written Opinion dated 24 April 2012 for the above-captioned patent application.

Attached please find sheets containing claim amendments submitted in accordance with PCT Article 19. For the examiner's convenience, a complete set of amended claims with annotations is provided, wherein underlining shows language added and strikethrough shows language deleted. A second complete "clean" set of amended claims is also provided as Replacement Pages.

Original claims 24, 48, 49, 54, 55, and 56 are amended. No new matter is added.

Support for the claim amendments can be found in claims 25, 26, 27, 47 and 53 as originally filed, and throughout the instant specification, for instance at paragraphs [0021], [0022] and [0039].

48

PCT/US2011/063767 2010-12-22 2011-12-07 Unauthorized location detection and countermeasures WO2012087576A1 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
JP2013546186A JP2014509415A (en) 2010-12-22 2011-12-07 Unauthorized position detection and countermeasures
CN2011800609616A CN103270496A (en) 2010-12-22 2011-12-07 Unauthorized location detection and countermeasures
EP11850974.4A EP2656220A4 (en) 2010-12-22 2011-12-07 Unauthorized location detection and countermeasures
MX2013007174A MX2013007174A (en) 2010-12-22 2011-12-07 Unauthorized location detection and countermeasures.
KR1020137019276A KR20140004141A (en) 2010-12-22 2011-12-07 Unauthorized location detection and countermeasures
CA2818904A CA2818904A1 (en) 2010-12-22 2011-12-07 Unauthorized location detection and countermeasures
BR112013016172A BR112013016172A2 (en) 2010-12-22 2011-12-07 unauthorized location detection and preventive measures.
AU2011349824A AU2011349824B2 (en) 2010-12-22 2011-12-07 Unauthorized location detection and countermeasures

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/976,908 US8627484B2 (en) 2010-12-22 2010-12-22 Unauthorized location detection and countermeasures
US12/976,908 2010-12-22

Publications (2)

Publication Number Publication Date
WO2012087576A1 WO2012087576A1 (en) 2012-06-28
WO2012087576A4 true WO2012087576A4 (en) 2012-08-16

Family

ID=46314344

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2011/063767 WO2012087576A1 (en) 2010-12-22 2011-12-07 Unauthorized location detection and countermeasures

Country Status (10)

Country Link
US (2) US8627484B2 (en)
EP (1) EP2656220A4 (en)
JP (1) JP2014509415A (en)
KR (1) KR20140004141A (en)
CN (1) CN103270496A (en)
AU (1) AU2011349824B2 (en)
BR (1) BR112013016172A2 (en)
CA (1) CA2818904A1 (en)
MX (1) MX2013007174A (en)
WO (1) WO2012087576A1 (en)

Families Citing this family (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120276926A1 (en) * 2002-03-28 2012-11-01 Lance Douglas Pitt Location Fidelity Adjustment Based on Mobile Subscriber Privacy Profile
US10292057B2 (en) * 2011-02-04 2019-05-14 T-Mobile Usa, Inc. Network identification and display based on local information
US9965133B1 (en) * 2011-07-22 2018-05-08 Ntrepid Corporation Application for assisting in conducting covert cyber operations
KR101614901B1 (en) * 2012-02-07 2016-04-22 애플 인크. Network assisted fraud detection apparatus and methods
US9094830B2 (en) * 2012-07-05 2015-07-28 Blackberry Limited Managing data transfer across a network interface
US10279906B2 (en) 2012-12-19 2019-05-07 Elwha Llc Automated hazard handling routine engagement
US9810789B2 (en) 2012-12-19 2017-11-07 Elwha Llc Unoccupied flying vehicle (UFV) location assurance
US9527587B2 (en) 2012-12-19 2016-12-27 Elwha Llc Unoccupied flying vehicle (UFV) coordination
US9405296B2 (en) 2012-12-19 2016-08-02 Elwah LLC Collision targeting for hazard handling
US9669926B2 (en) * 2012-12-19 2017-06-06 Elwha Llc Unoccupied flying vehicle (UFV) location confirmance
US9540102B2 (en) 2012-12-19 2017-01-10 Elwha Llc Base station multi-vehicle coordination
US9235218B2 (en) 2012-12-19 2016-01-12 Elwha Llc Collision targeting for an unoccupied flying vehicle (UFV)
US9527586B2 (en) 2012-12-19 2016-12-27 Elwha Llc Inter-vehicle flight attribute communication for an unoccupied flying vehicle (UFV)
US10518877B2 (en) 2012-12-19 2019-12-31 Elwha Llc Inter-vehicle communication for hazard handling for an unoccupied flying vehicle (UFV)
US9776716B2 (en) 2012-12-19 2017-10-03 Elwah LLC Unoccupied flying vehicle (UFV) inter-vehicle communication for hazard handling
US9567074B2 (en) 2012-12-19 2017-02-14 Elwha Llc Base station control for an unoccupied flying vehicle (UFV)
US9747809B2 (en) 2012-12-19 2017-08-29 Elwha Llc Automated hazard handling routine activation
US9429640B2 (en) * 2012-12-28 2016-08-30 Trimble Navigation Limited Obtaining pseudorange information using a cellular device
US10324826B2 (en) * 2013-02-12 2019-06-18 Focus IP Inc. Developer channel compliance
US20140282908A1 (en) * 2013-03-13 2014-09-18 Location Sentry Corp Intelligent agent for privacy and security
US9467804B2 (en) * 2013-05-20 2016-10-11 Location Sentry Corp. Emission control for wireless location management
US9998914B2 (en) * 2014-04-16 2018-06-12 Jamf Software, Llc Using a mobile device to restrict focus and perform operations at another mobile device
US20150312697A1 (en) * 2014-04-28 2015-10-29 Intel IP Corporation Dynamic declaration of conformity and certification for radio application distribution
US9258713B2 (en) 2014-05-15 2016-02-09 Cisco Technology, Inc. Rogue wireless beacon device detection
US9408036B2 (en) 2014-05-15 2016-08-02 Cisco Technology, Inc. Managing wireless beacon devices
US9432796B2 (en) * 2014-05-30 2016-08-30 Apple Inc. Dynamic adjustment of mobile device based on peer event data
US9551775B2 (en) 2014-09-04 2017-01-24 Cisco Technology, Inc. Enhancing client location via beacon detection
US9967906B2 (en) 2015-01-07 2018-05-08 Cisco Technology, Inc. Wireless roaming using a distributed store
US10659479B2 (en) * 2015-03-27 2020-05-19 Mcafee, Llc Determination of sensor usage
US9985837B2 (en) 2015-07-23 2018-05-29 Cisco Technology, Inc. Refresh of the binding tables between data-link-layer and network-layer addresses on mobility in a data center environment
US9642167B1 (en) 2015-12-17 2017-05-02 Cisco Technology, Inc. Location-based VoIP functions in a wireless network
US9913104B2 (en) * 2016-01-21 2018-03-06 General Motors Llc Vehicle location services
US9723588B1 (en) * 2016-03-28 2017-08-01 Google Inc. Determining a location of a wireless transmitter
US10171468B2 (en) 2016-08-23 2019-01-01 International Business Machines Corporation Selective processing of application permissions
US10326204B2 (en) 2016-09-07 2019-06-18 Cisco Technology, Inc. Switchable, oscillating near-field and far-field antenna
US10527430B2 (en) * 2016-09-23 2020-01-07 Qualcomm Incorporated Method and apparatus for beacon data collection
US10440723B2 (en) 2017-05-17 2019-10-08 Cisco Technology, Inc. Hierarchical channel assignment in wireless networks
US10555341B2 (en) 2017-07-11 2020-02-04 Cisco Technology, Inc. Wireless contention reduction
US10440031B2 (en) 2017-07-21 2019-10-08 Cisco Technology, Inc. Wireless network steering
US10735981B2 (en) 2017-10-10 2020-08-04 Cisco Technology, Inc. System and method for providing a layer 2 fast re-switch for a wireless controller
US10375667B2 (en) 2017-12-07 2019-08-06 Cisco Technology, Inc. Enhancing indoor positioning using RF multilateration and optical sensing
US10673618B2 (en) 2018-06-08 2020-06-02 Cisco Technology, Inc. Provisioning network resources in a wireless network using a native blockchain platform
US10505718B1 (en) 2018-06-08 2019-12-10 Cisco Technology, Inc. Systems, devices, and techniques for registering user equipment (UE) in wireless networks using a native blockchain platform
US10873636B2 (en) 2018-07-09 2020-12-22 Cisco Technology, Inc. Session management in a forwarding plane
US10671462B2 (en) 2018-07-24 2020-06-02 Cisco Technology, Inc. System and method for message management across a network
US11252040B2 (en) 2018-07-31 2022-02-15 Cisco Technology, Inc. Advanced network tracing in the data plane
US10284429B1 (en) 2018-08-08 2019-05-07 Cisco Technology, Inc. System and method for sharing subscriber resources in a network environment
US10735209B2 (en) 2018-08-08 2020-08-04 Cisco Technology, Inc. Bitrate utilization feedback and control in 5G-NSA networks
US10623949B2 (en) 2018-08-08 2020-04-14 Cisco Technology, Inc. Network-initiated recovery from a text message delivery failure
US10949557B2 (en) 2018-08-20 2021-03-16 Cisco Technology, Inc. Blockchain-based auditing, instantiation and maintenance of 5G network slices
US10374749B1 (en) 2018-08-22 2019-08-06 Cisco Technology, Inc. Proactive interference avoidance for access points
US10567293B1 (en) 2018-08-23 2020-02-18 Cisco Technology, Inc. Mechanism to coordinate end to end quality of service between network nodes and service provider core
US10230605B1 (en) 2018-09-04 2019-03-12 Cisco Technology, Inc. Scalable distributed end-to-end performance delay measurement for segment routing policies
US10652152B2 (en) 2018-09-04 2020-05-12 Cisco Technology, Inc. Mobile core dynamic tunnel end-point processing
US10779188B2 (en) 2018-09-06 2020-09-15 Cisco Technology, Inc. Uplink bandwidth estimation over broadband cellular networks
US11558288B2 (en) 2018-09-21 2023-01-17 Cisco Technology, Inc. Scalable and programmable mechanism for targeted in-situ OAM implementation in segment routing networks
US10285155B1 (en) 2018-09-24 2019-05-07 Cisco Technology, Inc. Providing user equipment location information indication on user plane
US10601724B1 (en) 2018-11-01 2020-03-24 Cisco Technology, Inc. Scalable network slice based queuing using segment routing flexible algorithm
US11086991B2 (en) * 2019-08-07 2021-08-10 Advanced New Technologies Co., Ltd. Method and system for active risk control based on intelligent interaction
US11606769B2 (en) 2020-04-03 2023-03-14 Skyhook Wireless, Inc. SIM-based positioning
KR102396614B1 (en) * 2021-12-14 2022-05-12 주식회사 지란지교데이터 Location information security processing method and device

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6311059B1 (en) * 1999-02-05 2001-10-30 Nec Corporation Mobile radio station
US6505048B1 (en) * 1999-12-30 2003-01-07 Samsung Electronics Co., Ltd. Location privacy feature for wireless mobile stations and method of operation
US6633621B1 (en) * 2000-03-20 2003-10-14 Motorola, Inc. Apparatus and method for synchronizing a clock using a phase-locked loop circuit
DE60142539D1 (en) * 2000-03-31 2010-08-26 Ntt Docomo Inc METHOD FOR INFORMING A POSITION INFORMATION AND MOBILE COMMUNICATION TERMINAL
US6473031B1 (en) * 2000-10-16 2002-10-29 Scott C. Harris Position privacy in an electronic device
US7006835B2 (en) * 2001-01-11 2006-02-28 Sanyo Electric Co., Ltd. Method of and system for providing position information
US6594483B2 (en) * 2001-05-15 2003-07-15 Nokia Corporation System and method for location based web services
US6506048B1 (en) * 2001-11-01 2003-01-14 Procedyne Corp. Apparatus and method for transferring heat treated parts
WO2003058994A1 (en) * 2002-01-08 2003-07-17 Siemens Aktiengesellschaft Improved data protection for position-dependent services
JP4016787B2 (en) * 2002-07-31 2007-12-05 日本電気株式会社 Positioning system in mobile communication network
US7751826B2 (en) * 2002-10-24 2010-07-06 Motorola, Inc. System and method for E911 location privacy protection
US7426383B2 (en) 2003-12-22 2008-09-16 Symbol Technologies, Inc. Wireless LAN intrusion detection based on location
EP3745634A1 (en) * 2004-10-15 2020-12-02 Apple Inc. Communication resource allocation systems and methods
US20060099970A1 (en) * 2004-11-10 2006-05-11 Morgan Scott D Method and system for providing a log of mobile station location requests
US8150421B2 (en) * 2005-12-30 2012-04-03 Trueposition, Inc. User plane uplink time difference of arrival (U-TDOA)
US20080242373A1 (en) * 2007-03-26 2008-10-02 Motorola, Inc. Method and device for providing position information
US8060074B2 (en) 2007-07-30 2011-11-15 Mobile Iron, Inc. Virtual instance architecture for mobile device management systems
US9071974B2 (en) 2008-06-29 2015-06-30 Oceans Edge, Inc. Mobile telephone firewall and compliance enforcement system and method
US20100077484A1 (en) * 2008-09-23 2010-03-25 Yahoo! Inc. Location tracking permissions and privacy
US7800533B2 (en) 2008-11-24 2010-09-21 Andrew, Llc System and method for determining falsified geographic location of a mobile device
US8271057B2 (en) 2009-03-16 2012-09-18 Waze Mobile Ltd. Condition-based activation, shut-down and management of applications of mobile devices
US8341749B2 (en) * 2009-06-26 2012-12-25 Vmware, Inc. Preventing malware attacks in virtualized mobile devices
EP2312485B1 (en) * 2009-08-31 2018-08-08 BlackBerry Limited System and method for controlling applications to mitigate the effects of malicious software

Also Published As

Publication number Publication date
EP2656220A1 (en) 2013-10-30
BR112013016172A2 (en) 2018-07-17
EP2656220A4 (en) 2015-07-01
MX2013007174A (en) 2013-08-01
AU2011349824A1 (en) 2013-06-13
KR20140004141A (en) 2014-01-10
AU2011349824B2 (en) 2015-11-05
US8627484B2 (en) 2014-01-07
US20140059655A1 (en) 2014-02-27
CA2818904A1 (en) 2012-06-28
JP2014509415A (en) 2014-04-17
WO2012087576A1 (en) 2012-06-28
US9119063B2 (en) 2015-08-25
US20120167207A1 (en) 2012-06-28
CN103270496A (en) 2013-08-28

Similar Documents

Publication Publication Date Title
WO2012087576A4 (en) Unauthorized location detection and countermeasures
US9989649B2 (en) Systems and methods for power efficient tracking
US9686650B2 (en) Wireless beacon filtering and untrusted data detection
WO2012159195A1 (en) Method and system for monitoring interactions with a vehicle
EP2883376B1 (en) A system and method for measuring the crowdedness of people at a place
US10984040B2 (en) Collection and provision method, device, system and server for vehicle image data
WO2018133290A1 (en) Intelligent tracking and positioning method and system, server, and positioning terminal
US11280913B2 (en) Global positioning system spoofing countermeasures
US20200084577A1 (en) Wireless locator system
US11743685B2 (en) Systems and methods for monitoring system equipment diagnosis
CN103200579A (en) Measurement reporting method, measurement reporting device and measurement reporting system
US20090325600A1 (en) System and method for collecting communication signals
US8880092B1 (en) Using smart meters to determine mobile wireless computing device location
JP5853088B2 (en) Information processing apparatus, program, and method
US20140160948A1 (en) Ota mobile device classification
JP5591980B1 (en) Information processing apparatus and program
CN114125846B (en) Integrity protection method and system
US20170308668A1 (en) Measurement instrument, transmission control method, mobile communications terminal, and computer-readable recording medium
CN103402172B (en) The display packing of a kind of short message, device and system
US9961534B2 (en) Program and information processing apparatus
US9320012B2 (en) Information processing apparatus, computer-readable medium, and method
JP5658770B2 (en) Information processing apparatus, program, and method
US20220228887A1 (en) Odometer interpolation using gps data
US11895556B2 (en) Systems and methods for correlating encounters between entities via ubiquitous networks
US20170076086A1 (en) Program and information processing apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11850974

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2818904

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 226648

Country of ref document: IL

ENP Entry into the national phase

Ref document number: 2011349824

Country of ref document: AU

Date of ref document: 20111207

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: MX/A/2013/007174

Country of ref document: MX

ENP Entry into the national phase

Ref document number: 2013546186

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20137019276

Country of ref document: KR

Kind code of ref document: A

REEP Request for entry into the european phase

Ref document number: 2011850974

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2011850974

Country of ref document: EP

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112013016172

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112013016172

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20130624