Spotique: a New Approach to Local Messaging


Published on

This paper describes a new approach to local messaging. Our application combines passive monitoring for smart phones and cloud based messaging for mobile OS (operational system). Passive monitoring can determine the location of mobile subscribers (mobile phones, actually) without the active participation of the users. Mobile users do not need to mark own location on social networks (check-in), they do not need to run on their phones the location track applications. In the same time, Cloud Messaging allows interested parties to directly deliver their information to mobile users who find themselves near a selected point. This is the main content of the service - how to combine the monitoring and notifications.

Published in: Technology, Business
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Spotique: a New Approach to Local Messaging

  1. 1. Spotique: a New Approachto Local MessagingManfred Sneps-SneppeVentspils University Collegemanfreds.sneps@gmail.comDmitry NamiotLomonosov Moscow State Universitydnamiot@gmail.comWWIC 2013
  2. 2. • A new model for local area messagingbased on the network proximity.• Mobile mashup combines passive Wi-Fimonitoring with Cloud Messaging.• Passive monitoring can determine thelocation of mobile subscribers (mobilephones) without the active participation ofmobile users.• Cloud Messaging delivers notificationsAbout
  3. 3. ContentsIntroductionPassive Wi-Fi monitoringCloud MessagingSpotique: Local area messaging mashupConclusion
  4. 4. Passive Wi-Fi monitoring• Wi-Fi probe request• Client (even notconnected) can sendrequests to AP• AP can analyzerequests• We can collect MAC-addresses for clients
  5. 5. Advantages and disadvantages• It does not require special mobile applications• For mobile users it works automatically andtransparently• It is anonymous monitoring. MAC address isused for re-identification only. It could bereplaced with some hash-code (privacy)• It is not 100% reliable. There is no warrantythat Wi-Fi client will send probe request
  6. 6. Probe requests (iOS)• Idle: Sends probe request every 8 minutesfor 30-60 minutes.• Idle (some iOS 5.0 phones): Sends proberequests every minute.• Active from standby: Wi-Fi is on andscanning (with probe requests).• Background app (email), Wi-Fi is on:probe requests are sent when app need todata access
  7. 7. Passive monitoring examplesLibelium
  8. 8. Passive monitoring examples.Cisco MSE
  9. 9. Cloud Messaging• Cloud infrastructurefrom vendor• Google, Apple,Microsoft, Nokia –own cloud basedinfrastructures fornotifications• Google message: 4Kb payload delivery
  10. 10. Google Cloud Messages
  11. 11. Key moments for Cloud Messaging• Application registers with CloudMessaging• Application provides a key from CloudMessaging server (subscribes) to theparticular application (Sender)• Sender saves keys and use them later fordelivering notifications• Key moment – subscription is activatedfrom the mobile application on theparticular phone.
  12. 12. Key moments for mashup• Let us extend the subscription process• Mobile application (mobile phone, actually)will provide a key for notification and MAC-address for identification• Sender can compare saved MAC-addresses with the MAC-addresses,collected by the passive monitoring
  13. 13. Key moments for mashup - 2• Sender can deliver notifications to those,who are nearby only.• It is real-time detection• MAC-address is used for the re-identification only. So, it could be replacedwith some hash-code (privacy)
  14. 14. Use cases• Proximity marketing• Deliver local area messages in retail• Hyper-local new delivery in campuses.Tested in Lomonosov Moscow StateUniversity• Smart Cities information delivery
  15. 15. Conclusion• A new mashup based on passive Wi-Fi monitoring forA new mashup based on passive Wi-Fi monitoring formobile devices and cloud based devices and cloud based notifications.• Passive monitoring uses probe requests, notificationPassive monitoring uses probe requests, notificationmodule uses cloud messaging (push notifications)module uses cloud messaging (push notifications)• This approach does not require special mobileThis approach does not require special mobileapplications for mobile users.applications for mobile users.• This application does not publish location info in theThis application does not publish location info in thesocial network.• Custom messages will target online subscribers inCustom messages will target online subscribers inthe nearby area only.the nearby area only.
  16. 16. About usInternational team: Russia - LatviaInternational team: Russia - Latvia ((Moscow –Moscow –Riga – VentspilsRiga – Ventspils).). Big history of developingBig history of developinginnovative telecom and software services,innovative telecom and software services,international contests awardsinternational contests awardsResearch areas are:Research areas are:open API for telecom,open API for telecom,web access for telecom data,web access for telecom data,Smart Cities,Smart Cities,M2M applications, context-aware computingM2M applications, context-aware computing..