SlideShare a Scribd company logo
1 of 16
Local Messages for
Smartphones
Dmitry Namiot Lomonosov Moscow State University
dnamiot@gmail.com
Manfred Sneps-Sneppe Ventspils University College
manfreds.sneps@gmail.com
CFIC 2013
• A new model for local area messaging
based on the network proximity.
• Mobile mashup which combines Wi-Fi
proximity measurements with Cloud
Messaging.
• Passive monitoring can determine the
location of mobile subscribers (mobile
phones) without the active participation of
mobile users.
• Cloud Messaging delivers notifications
About
Contents
Introduction
Passive Wi-Fi monitoring
Cloud Messaging
Local area messaging mashup
Conclusion
Passive Wi-Fi monitoring
• Wi-Fi probe request
• Client (even not
connected) can send
requests to AP
• AP can analyze
requests
• We can collect MAC-
addresses for clients
Advantages and disadvantages
• Does not require special mobile applications
• For mobile users it works automatically and
transparently
• It is anonymous monitoring. MAC address is
used for re-identification only. It could be
replaced with some hash-code (privacy)
• It is not 100% reliable. There is no warranty
that Wi-Fi client will send probe request
Passive monitoring examples
Navizon
Passive monitoring examples.
Cisco MSE
Passive monitoring examples.
Libelium
Cloud Messaging
• Cloud infrastructure
from vendor
• Google, Apple,
Microsoft, Nokia –
own cloud based
infrastructures for
notifications
• Google message: 4
Kb payload delivery
Google Cloud Messages
Key moments for Cloud Messaging
• Application register with Cloud Messaging
• Application provides a key from Cloud
Messaging server (subscribes) to the
particular application (Sender)
• Sender saves keys and use them later for
delivering notifications
• Key moment – subscription is activated
from the mobile application on the
particular phone.
Key moments for mashup
• Let us extend the subscription process
• Mobile application (mobile phone, actually)
will provide a key for notification and MAC-
address for identification
• Sender can compare saved MAC-
addresses with the MAC-addresses,
collected by the passive monitoring
Key moments for mashup - 2
• Sender can deliver notifications to those,
who are nearby only.
• It is real-time detection
• MAC-address is used for the re-
identification only. So, it could be replaced
with some hash-code (privacy)
Use cases
• Proximity marketing
• Deliver local area messages in retail
• Hyper-local new delivery in campuses.
Tested in Lomonosov Moscow State
University
• Smart Cities information delivery
Conclusion
• A new mashup based on passive Wi-Fi monitoring forA new mashup based on passive Wi-Fi monitoring for
mobile devices and cloud based notifications.mobile devices and cloud based notifications.
• Passive monitoring uses probe requests from Wi-FiPassive monitoring uses probe requests from Wi-Fi
specifications for detecting nearby clients.specifications for detecting nearby clients.
• Notification module uses cloud messaging (pushNotification module uses cloud messaging (push
notifications) from mobile operational systems.notifications) from mobile operational systems.
• This approach does not require special mobileThis approach does not require special mobile
applications for mobile users.applications for mobile users.
• This application does not publish location info in theThis application does not publish location info in the
social network.social network.
• Custom messages will target online subscribers inCustom messages will target online subscribers in
the nearby area only.the nearby area only.
About us
International team: Russia - LatviaInternational team: Russia - Latvia ((Moscow –Moscow –
Riga – VentspilsRiga – Ventspils).). Big history of developingBig history of developing
innovative telecom and software services,innovative telecom and software services,
international contests awardsinternational contests awards
Research areas are:Research areas are:
open API for telecom,open API for telecom,
web access for telecom data,web access for telecom data,
Smart Cities,Smart Cities,
M2M applications, context-aware computingM2M applications, context-aware computing..

More Related Content

Viewers also liked

Export1
Export1Export1
Export1MPS
 
Hide email address in sourc...
Hide email address in sourc...Hide email address in sourc...
Hide email address in sourc...chaitanya535
 
Ovid数据库检索系统
Ovid数据库检索系统Ovid数据库检索系统
Ovid数据库检索系统hanliangalexx
 
Jisc smudie project report 1
Jisc smudie project report 1Jisc smudie project report 1
Jisc smudie project report 1Tony Toole
 
Automotive Industry
Automotive IndustryAutomotive Industry
Automotive IndustryAnkur Pandey
 
Cia. Hering - 1Q16 Results
Cia. Hering - 1Q16 ResultsCia. Hering - 1Q16 Results
Cia. Hering - 1Q16 ResultsCia Hering RI
 
Digitale Chinees - wegwijs langs tools, software en andere handige hulpmiddel...
Digitale Chinees - wegwijs langs tools, software en andere handige hulpmiddel...Digitale Chinees - wegwijs langs tools, software en andere handige hulpmiddel...
Digitale Chinees - wegwijs langs tools, software en andere handige hulpmiddel...Marjolein Hoekstra
 
ChinaJoy 2014 Map - WMGC Area
ChinaJoy 2014 Map - WMGC AreaChinaJoy 2014 Map - WMGC Area
ChinaJoy 2014 Map - WMGC AreaOdin Woo
 
Dong Chuan introduction
Dong Chuan introductionDong Chuan introduction
Dong Chuan introductionMarvin Zhang
 
Automotive industry
Automotive industryAutomotive industry
Automotive industryfshariar
 

Viewers also liked (19)

Export1
Export1Export1
Export1
 
Cabos Vga
Cabos VgaCabos Vga
Cabos Vga
 
Hide email address in sourc...
Hide email address in sourc...Hide email address in sourc...
Hide email address in sourc...
 
Ovid数据库检索系统
Ovid数据库检索系统Ovid数据库检索系统
Ovid数据库检索系统
 
Jisc smudie project report 1
Jisc smudie project report 1Jisc smudie project report 1
Jisc smudie project report 1
 
Automotive Industry
Automotive IndustryAutomotive Industry
Automotive Industry
 
Cia. Hering - 1Q16 Results
Cia. Hering - 1Q16 ResultsCia. Hering - 1Q16 Results
Cia. Hering - 1Q16 Results
 
Aphyu
AphyuAphyu
Aphyu
 
鬍鬚張魯肉飯
鬍鬚張魯肉飯鬍鬚張魯肉飯
鬍鬚張魯肉飯
 
2. cella energy
2. cella energy2. cella energy
2. cella energy
 
Interfacing with Virtual Worlds
Interfacing with Virtual WorldsInterfacing with Virtual Worlds
Interfacing with Virtual Worlds
 
Digitale Chinees - wegwijs langs tools, software en andere handige hulpmiddel...
Digitale Chinees - wegwijs langs tools, software en andere handige hulpmiddel...Digitale Chinees - wegwijs langs tools, software en andere handige hulpmiddel...
Digitale Chinees - wegwijs langs tools, software en andere handige hulpmiddel...
 
Mail server
Mail serverMail server
Mail server
 
Doi gio hu
Doi gio huDoi gio hu
Doi gio hu
 
ChinaJoy 2014 Map - WMGC Area
ChinaJoy 2014 Map - WMGC AreaChinaJoy 2014 Map - WMGC Area
ChinaJoy 2014 Map - WMGC Area
 
Cewarn
CewarnCewarn
Cewarn
 
Dong Chuan introduction
Dong Chuan introductionDong Chuan introduction
Dong Chuan introduction
 
一个证券分析师的醒悟
一个证券分析师的醒悟一个证券分析师的醒悟
一个证券分析师的醒悟
 
Automotive industry
Automotive industryAutomotive industry
Automotive industry
 

Similar to Local Messages for Smartphones Using Passive Wi-Fi and Cloud Messaging

Wi-Fi proximity and context-aware browsing
Wi-Fi proximity and context-aware browsingWi-Fi proximity and context-aware browsing
Wi-Fi proximity and context-aware browsingColdbeans Software
 
Wireless Networks Sensors and Social Streams
Wireless Networks Sensors and Social Streams  Wireless Networks Sensors and Social Streams
Wireless Networks Sensors and Social Streams Coldbeans Software
 
Combain Mobile Positioning - Mobile World Congress 2014
Combain Mobile Positioning - Mobile World Congress 2014Combain Mobile Positioning - Mobile World Congress 2014
Combain Mobile Positioning - Mobile World Congress 2014Combain Mobile AB
 
Hotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesHotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesDr. Mazlan Abbas
 
wirelessbbppt.ppt
wirelessbbppt.pptwirelessbbppt.ppt
wirelessbbppt.pptnitin_009
 
Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IPAshish Chandurkar
 
LBS-2011: a new model for getting local content
LBS-2011: a new model for getting local contentLBS-2011: a new model for getting local content
LBS-2011: a new model for getting local contentColdbeans Software
 

Similar to Local Messages for Smartphones Using Passive Wi-Fi and Cloud Messaging (20)

Analytics for mobile users
Analytics for mobile usersAnalytics for mobile users
Analytics for mobile users
 
Proximity as a service
Proximity as a serviceProximity as a service
Proximity as a service
 
Wi-Fi proximity and context-aware browsing
Wi-Fi proximity and context-aware browsingWi-Fi proximity and context-aware browsing
Wi-Fi proximity and context-aware browsing
 
Bluetooth Data Points
Bluetooth Data PointsBluetooth Data Points
Bluetooth Data Points
 
Wireless Networks Sensors and Social Streams
Wireless Networks Sensors and Social Streams  Wireless Networks Sensors and Social Streams
Wireless Networks Sensors and Social Streams
 
On hyper-local web pages
On hyper-local web pagesOn hyper-local web pages
On hyper-local web pages
 
Wi-Fi proiximity as a service
Wi-Fi proiximity as a serviceWi-Fi proiximity as a service
Wi-Fi proiximity as a service
 
Combain Mobile Positioning - Mobile World Congress 2014
Combain Mobile Positioning - Mobile World Congress 2014Combain Mobile Positioning - Mobile World Congress 2014
Combain Mobile Positioning - Mobile World Congress 2014
 
Hotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesHotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and Challenges
 
Cars as Tags
Cars as TagsCars as Tags
Cars as Tags
 
M2M.pptx
M2M.pptxM2M.pptx
M2M.pptx
 
wirelessbbppt.ppt
wirelessbbppt.pptwirelessbbppt.ppt
wirelessbbppt.ppt
 
Wireless Technologies For The Internet Of Things
Wireless Technologies For The Internet Of ThingsWireless Technologies For The Internet Of Things
Wireless Technologies For The Internet Of Things
 
Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IP
 
Context-aware mobile messages
Context-aware mobile messagesContext-aware mobile messages
Context-aware mobile messages
 
아키텍트대회기조강연 박준성(071813)
아키텍트대회기조강연 박준성(071813)아키텍트대회기조강연 박준성(071813)
아키텍트대회기조강연 박준성(071813)
 
Chapter-3.pptx
Chapter-3.pptxChapter-3.pptx
Chapter-3.pptx
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
LBS-2011: a new model for getting local content
LBS-2011: a new model for getting local contentLBS-2011: a new model for getting local content
LBS-2011: a new model for getting local content
 
Chapter-3.pdf
Chapter-3.pdfChapter-3.pdf
Chapter-3.pdf
 

More from Coldbeans Software

On Internet of Things education
On Internet of Things educationOn Internet of Things education
On Internet of Things educationColdbeans Software
 
Стандарты в цифровой экономике
Стандарты в цифровой экономикеСтандарты в цифровой экономике
Стандарты в цифровой экономикеColdbeans Software
 
On Internet of Things programming models
On Internet of Things programming modelsOn Internet of Things programming models
On Internet of Things programming modelsColdbeans Software
 
Безопасный город
Безопасный городБезопасный город
Безопасный городColdbeans Software
 
Twitter as a Transport Layer Platform
Twitter as a Transport Layer Platform Twitter as a Transport Layer Platform
Twitter as a Transport Layer Platform Coldbeans Software
 
On data model for context–aware services
On data model for context–aware servicesOn data model for context–aware services
On data model for context–aware servicesColdbeans Software
 
On Web-based Domain-Specific Language for Internet of Things
On Web-based Domain-Specific Language for Internet of ThingsOn Web-based Domain-Specific Language for Internet of Things
On Web-based Domain-Specific Language for Internet of ThingsColdbeans Software
 
ON THE SYNERGY OF CIRCUITS AND PACKETS
ON THE SYNERGY OF CIRCUITS AND PACKETS ON THE SYNERGY OF CIRCUITS AND PACKETS
ON THE SYNERGY OF CIRCUITS AND PACKETS Coldbeans Software
 
Базы данных для временных рядов
Базы данных для временных рядовБазы данных для временных рядов
Базы данных для временных рядовColdbeans Software
 
Метаданные в модели REST
Метаданные в модели RESTМетаданные в модели REST
Метаданные в модели RESTColdbeans Software
 
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.Coldbeans Software
 
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” nowFrom Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” nowColdbeans Software
 
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI Coldbeans Software
 
On Database for Mobile Phones Ownership
On Database for Mobile Phones OwnershipOn Database for Mobile Phones Ownership
On Database for Mobile Phones OwnershipColdbeans Software
 
Выделение групп пользователей в данных мобильного мониторинга
Выделение групп пользователей в данных мобильного мониторингаВыделение групп пользователей в данных мобильного мониторинга
Выделение групп пользователей в данных мобильного мониторингаColdbeans Software
 

More from Coldbeans Software (20)

On Internet of Things education
On Internet of Things educationOn Internet of Things education
On Internet of Things education
 
Стандарты в цифровой экономике
Стандарты в цифровой экономикеСтандарты в цифровой экономике
Стандарты в цифровой экономике
 
On Internet of Things programming models
On Internet of Things programming modelsOn Internet of Things programming models
On Internet of Things programming models
 
IoT education
IoT educationIoT education
IoT education
 
On Crowd-sensing back-end
On Crowd-sensing back-endOn Crowd-sensing back-end
On Crowd-sensing back-end
 
On Physical Web models
On Physical Web modelsOn Physical Web models
On Physical Web models
 
Безопасный город
Безопасный городБезопасный город
Безопасный город
 
Twitter as a Transport Layer Platform
Twitter as a Transport Layer Platform Twitter as a Transport Layer Platform
Twitter as a Transport Layer Platform
 
On data model for context–aware services
On data model for context–aware servicesOn data model for context–aware services
On data model for context–aware services
 
On time-series databases
On time-series databasesOn time-series databases
On time-series databases
 
On Web-based Domain-Specific Language for Internet of Things
On Web-based Domain-Specific Language for Internet of ThingsOn Web-based Domain-Specific Language for Internet of Things
On Web-based Domain-Specific Language for Internet of Things
 
ON THE SYNERGY OF CIRCUITS AND PACKETS
ON THE SYNERGY OF CIRCUITS AND PACKETS ON THE SYNERGY OF CIRCUITS AND PACKETS
ON THE SYNERGY OF CIRCUITS AND PACKETS
 
Базы данных для временных рядов
Базы данных для временных рядовБазы данных для временных рядов
Базы данных для временных рядов
 
Метаданные в модели REST
Метаданные в модели RESTМетаданные в модели REST
Метаданные в модели REST
 
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
 
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” nowFrom Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
 
Sensing
SensingSensing
Sensing
 
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
 
On Database for Mobile Phones Ownership
On Database for Mobile Phones OwnershipOn Database for Mobile Phones Ownership
On Database for Mobile Phones Ownership
 
Выделение групп пользователей в данных мобильного мониторинга
Выделение групп пользователей в данных мобильного мониторингаВыделение групп пользователей в данных мобильного мониторинга
Выделение групп пользователей в данных мобильного мониторинга
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Local Messages for Smartphones Using Passive Wi-Fi and Cloud Messaging

  • 1. Local Messages for Smartphones Dmitry Namiot Lomonosov Moscow State University dnamiot@gmail.com Manfred Sneps-Sneppe Ventspils University College manfreds.sneps@gmail.com CFIC 2013
  • 2. • A new model for local area messaging based on the network proximity. • Mobile mashup which combines Wi-Fi proximity measurements with Cloud Messaging. • Passive monitoring can determine the location of mobile subscribers (mobile phones) without the active participation of mobile users. • Cloud Messaging delivers notifications About
  • 3. Contents Introduction Passive Wi-Fi monitoring Cloud Messaging Local area messaging mashup Conclusion
  • 4. Passive Wi-Fi monitoring • Wi-Fi probe request • Client (even not connected) can send requests to AP • AP can analyze requests • We can collect MAC- addresses for clients
  • 5. Advantages and disadvantages • Does not require special mobile applications • For mobile users it works automatically and transparently • It is anonymous monitoring. MAC address is used for re-identification only. It could be replaced with some hash-code (privacy) • It is not 100% reliable. There is no warranty that Wi-Fi client will send probe request
  • 9. Cloud Messaging • Cloud infrastructure from vendor • Google, Apple, Microsoft, Nokia – own cloud based infrastructures for notifications • Google message: 4 Kb payload delivery
  • 11. Key moments for Cloud Messaging • Application register with Cloud Messaging • Application provides a key from Cloud Messaging server (subscribes) to the particular application (Sender) • Sender saves keys and use them later for delivering notifications • Key moment – subscription is activated from the mobile application on the particular phone.
  • 12. Key moments for mashup • Let us extend the subscription process • Mobile application (mobile phone, actually) will provide a key for notification and MAC- address for identification • Sender can compare saved MAC- addresses with the MAC-addresses, collected by the passive monitoring
  • 13. Key moments for mashup - 2 • Sender can deliver notifications to those, who are nearby only. • It is real-time detection • MAC-address is used for the re- identification only. So, it could be replaced with some hash-code (privacy)
  • 14. Use cases • Proximity marketing • Deliver local area messages in retail • Hyper-local new delivery in campuses. Tested in Lomonosov Moscow State University • Smart Cities information delivery
  • 15. Conclusion • A new mashup based on passive Wi-Fi monitoring forA new mashup based on passive Wi-Fi monitoring for mobile devices and cloud based notifications.mobile devices and cloud based notifications. • Passive monitoring uses probe requests from Wi-FiPassive monitoring uses probe requests from Wi-Fi specifications for detecting nearby clients.specifications for detecting nearby clients. • Notification module uses cloud messaging (pushNotification module uses cloud messaging (push notifications) from mobile operational systems.notifications) from mobile operational systems. • This approach does not require special mobileThis approach does not require special mobile applications for mobile users.applications for mobile users. • This application does not publish location info in theThis application does not publish location info in the social network.social network. • Custom messages will target online subscribers inCustom messages will target online subscribers in the nearby area only.the nearby area only.
  • 16. About us International team: Russia - LatviaInternational team: Russia - Latvia ((Moscow –Moscow – Riga – VentspilsRiga – Ventspils).). Big history of developingBig history of developing innovative telecom and software services,innovative telecom and software services, international contests awardsinternational contests awards Research areas are:Research areas are: open API for telecom,open API for telecom, web access for telecom data,web access for telecom data, Smart Cities,Smart Cities, M2M applications, context-aware computingM2M applications, context-aware computing..