A New Localization Algorithm of Mobile Phone for Outdoor Emergency Rescue

Author(s):  
Xin Ma ◽  
Quan-Yi Huang ◽  
Xue-Ming Shu
2014 ◽  
Vol 631-632 ◽  
pp. 618-622
Author(s):  
Mei Hui Xu ◽  
Ya Qi Wang ◽  
Long Xi Xu

The 3G era, the smartphone market share is higher and higher. The mobile phone based on the Android platform accounts for more than half of the market share. Once the user lost the phone, it is not only hard to find, but also to face important data leak and privacy security issues. So, the demand to provide mobile phone found function appears increasingly urgent. If the mobile phone is lost, this platform can get information on replaced mobile phone SIM card to boot for the first time, and upload the new mobile phone number and current phone location information to the server. It provides users with inquiry function on the web in order to achieve the purpose of tracking the lost mobile phone. The application prospect of this study is widespread, not only limited to track the missing phone, also involves other position service in the life need. The relevant mobile localization algorithm is detailed in this paper.


Author(s):  
Takahiro Ogawa ◽  
Daisuke Sakuma ◽  
Shin ichi Shiraishi ◽  
Miki Haseyama

Information ◽  
2018 ◽  
Vol 9 (8) ◽  
pp. 200
Author(s):  
Hongzhou Yue ◽  
Huaping Guo ◽  
Xingpo Ma

Geographical location and mobile phone numbers are important parts of user privacy and lots of studies have been working on the privacy leakage problems of these two aspects. However, no researchers have ever studied the security problems that can be caused by the interaction between them. We show a new form of network attack in this paper by making full use of the relationship between them; namely, we try to break a user’s mobile phone number with the aid of a user’s geographical location that has been broken. We study the phenomenon of exposing a user’s geographical location and parts of their phone number that exist in a series of popular software products, and the possibility of the user’s mobile phone number to be broken is discussed. We choose one of the software (the largest entertainment webcast platform in China—YY) as the research object. First, taking advantage of a series of security vulnerabilities that exist in YY, a user’s accurate geographical location is broken by the trilateration localization algorithm. Then, their mobile phone number attribution can be inferred according to their geographical location. Next, a mobile phone number test set is constructed according to the mobile phone segment allocation made by the three carriers (telecommunication operators) and the exposed parts of the user’s phone number. Finally, a brute-force method is used to break the user’s mobile phone number. The great effect of a user’s geographical location on breaking a mobile phone number is proved by experiments, and security precaution suggestions are given at the end of the paper.


2014 ◽  
Vol 35 (3) ◽  
pp. 158-165 ◽  
Author(s):  
Christian Montag ◽  
Konrad Błaszkiewicz ◽  
Bernd Lachmann ◽  
Ionut Andone ◽  
Rayna Sariyska ◽  
...  

In the present study we link self-report-data on personality to behavior recorded on the mobile phone. This new approach from Psychoinformatics collects data from humans in everyday life. It demonstrates the fruitful collaboration between psychology and computer science, combining Big Data with psychological variables. Given the large number of variables, which can be tracked on a smartphone, the present study focuses on the traditional features of mobile phones – namely incoming and outgoing calls and SMS. We observed N = 49 participants with respect to the telephone/SMS usage via our custom developed mobile phone app for 5 weeks. Extraversion was positively associated with nearly all related telephone call variables. In particular, Extraverts directly reach out to their social network via voice calls.


Author(s):  
Naomi F. Glasscock ◽  
Michael S. Wogalter
Keyword(s):  

2018 ◽  
Author(s):  
Valentina Boursier ◽  
Valentina Manna

Sign in / Sign up

Export Citation Format

Share Document