Mobility SBIR
Mobile Device Control, Small Business Innovation Research
Project Details
Client:
PMW 160
Technologies:
- Mobile device internal components
- GPS
- RF Networking
- WiFi networking
- Bluetooth Networking
- 3D mapping
SOLUTE, in concert with NIWC Pacific Mobile Land, is working to reduce the security risk presented by the increased use of mobile devices, while still leveraging the increased productivity provided by those devices. Utilizing current networking technologies, mobile device hardware, and learning algorithms, SOLUTE is developing a solution that will accurately track a mobile device with highly granular accuracy. This solution can be leveraged to secure both areas and data, preventing cyber-attacks and data theft due to unmanaged mobile devices.
SOLUTE’s Mobility project is built around a 6-layer solution. This includes a Physical Layer, taking advantage of the built-in device components such as the accelerometer and magnetometer to track and understand the device position. Using the data from the physical layer, the Local Learning Layer leverages local-side algorithms, machine learning, and deep learning techniques to optimize the readings and predict behavior. In the case of multiple devices, the Local Triangulation Layer utilizes a shared network of positional data to aid in the individual local devices in calculating their position relative to each other. To increase accuracy, the Intermediate Augmentation Layer consists of a variety of supplemental technology such as RF and motion sensing to provide more data points. The Remote Triangulation Layer leverages Location Awareness and Triangulation technologies to use GPS data to aid in a broader support capacity to narrow down device location. Finally, the Remote Learning Layer replicates the Local Learning tactics on the server side to assist in resolving server data supporting the device.
SOLUTE’s current software involves a web application that allows for the monitoring of participants, pulling up profiles using keyword searches. Additionally, if threatening conditions are encountered, the most capable users are assigned to respond, and the web application receives notifications and details concerning the incident. On the mobile user side, an application controls the device to allow or limit communication, as well as to push notifications to both the user and management.