A system with distributed proxy for reducing traffic in a wireless network satisfies data requests made by a mobile application. The system includes a mobile device having a local proxy for intercepting a data request made by the mobile application. The local proxy simulates application server responses for the mobile application on the mobile device for data requests where responses are available in the local cache. A proxy server is coupled to the mobile device and an application server to which the data request is made. The proxy server is able to communicate with the local proxy. The local proxy forwards the data request to the proxy server for transmission to the application server for a response to the data request. The proxy server queries the application server for any changes to the data request that the mobile application has previously made and notifies the local proxy of such changes.
H04W 88/18 - Service support devices; Network management devices
H04L 45/302 - Route determination based on requested QoS
H04L 47/122 - Avoiding congestion; Recovering from congestion by diverting traffic away from congested entities
H04L 47/25 - Flow control; Congestion control with rate being modified by the source upon detecting a change of network conditions
H04L 65/65 - Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
H04L 67/2885 - Hierarchically arranged intermediate devices, e.g. for hierarchical caching
H04L 67/289 - Intermediate processing functionally located close to the data consumer application, e.g. in same machine, in same home or in same sub-network
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
H04L 67/5683 - Storage of data provided by user terminals, i.e. reverse caching
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 28/02 - Traffic management, e.g. flow control or congestion control
Providing a mobile device with web-based access to data objects is disclosed. Authentication information is sent from a mobile device to a relay server. The relay server executes a connection application to establish a connection to a web access server. The authentication information is provided to the web access server associated with a data store hosting a data object. Upon authentication, the data object is provided to the relay server from the data store. The data object is then provided to the mobile device.
A mobile device allows transmission of additional outgoing application data requests in response to occurrence of receipt of data transfer from a remote entity, user input in response to a prompt displayed to the user, and a change in a background status of an application executing on the mobile device. Additional outgoing application data requests are foreground application requests.
A system includes a first computing device client associated with a first user in a community of users operable to send content to publish to a data aggregation server. The data aggregation server is operable to receive the content to publish from the first computing device client, host a first user profile associated with the first user of the first computing device client, the first user profile identifying a targeted recipient in the community of users, and disseminate automatically the content received from the first computing device client to a second computing device client associated with the targeted recipient, without receiving input from the first computing device client explicitly specifying the targeted recipient to whom the content is disseminated.
H04L 51/214 - Monitoring or handling of messages using selective forwarding
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
A method of buffering application data operable at a delivery control server is provided. Related systems and computer program products are also provided.
H04W 72/51 - Allocation or scheduling criteria for wireless resources based on terminal or device properties
H04L 67/06 - Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
H04L 67/289 - Intermediate processing functionally located close to the data consumer application, e.g. in same machine, in same home or in same sub-network
H04L 67/566 - Grouping or aggregating service requests, e.g. for unified processing
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
H04L 67/5681 - Pre-fetching or pre-delivering data based on network characteristics
H04L 67/62 - Establishing a time schedule for servicing the requests
H04M 3/42 - Systems providing special services or facilities to subscribers
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 24/02 - Arrangements for optimising operational condition
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
Systems and methods for home screen or application-launcher with integrated API-based device management for ad blocking on computing device is disclosed. The application-launcher allows the user to select whether to use API-based device management when launching an application. API-based device management is performed using API and other method hooking within a virtual container integrated into the application-launcher. The application launcher may isolate the applications when performing API-based device management. By directly intercepting API calls and other method calls at the application layer, no interception of network traffic is necessary, and there is no need to support network protocols at the network layer, because data can be received directly from an application. The identity of the APIs or methods to intercept and hook may be determined by analyzing a constructor or a signature in the application package.
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04M 15/00 - Arrangements for metering, time-control or time-indication
H04W 4/16 - Communication-related supplementary services, e.g. call-transfer or call-hold
H04M 3/487 - Arrangements for providing information services, e.g. recorded voice services or time announcements
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
OFFLOADING APPLICATION TRAFFIC TO A SHARED COMMUNICATION CHANNEL FOR SIGNAL OPTIMIZATION IN A WIRELESS NETWORK FOR TRAFFIC UTILIZING PROPRIETARY AND NON-PROPRIETARY PROTOCOLS
A method of reducing network traffic includes blocking, at a mobile device, a first channel to reduce network signaling in a network and to reduce battery consumption. The first channel includes a non-common channel. The method includes offloading application traffic of an application onto a second channel. The second channel may include a common channel. The method may include monitoring the application traffic of the application over the second channel, unblocking the first channel based on the monitored application traffic so that the application can perform an action, and re-blocking the first channel after the action has been completed. The method may include unblocking the first channel when user activity is detected, wherein the user activity includes whether the mobile device is being interacted with.
A system includes a first computing device client associated with a first user in a community of users operable to send content to publish to a data aggregation server. The data aggregation server is operable to receive the content to publish from the first computing device client, host a first user profile associated with the first user of the first computing device client, the first user profile identifying a targeted recipient in the community of users, and disseminate automatically the content received from the first computing device client to a second computing device client associated with the targeted recipient, without receiving input from the first computing device client explicitly specifying the targeted recipient to whom the content is disseminated.
H04L 51/214 - Monitoring or handling of messages using selective forwarding
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04M 15/00 - Arrangements for metering, time-control or time-indication
H04W 4/20 - Services signalling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
A method for IP [=Internet Protocol] communication between a mobile terminal and its correspondent node in a mobile radio network. The method comprises establishing an IP connection between the mobile terminal and its correspondent node. After detecting a period of inactivity in the IP connection, keep-alive messages are sent via the IP connection at predetermined intervals, which are varied. The method comprises monitoring the lengths of several periods of inactivity at which the mobile radio network disconnects the IP connection.
G08C 17/00 - Arrangements for transmitting signals characterised by the use of a wireless electrical link
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
H04L 43/103 - Active monitoring, e.g. heartbeat, ping or trace-route with adaptive polling, i.e. dynamically adapting the polling rate
H04L 67/145 - Termination or inactivation of sessions, e.g. event-controlled end of session avoiding end of session, e.g. keep-alive, heartbeats, resumption message or wake-up for inactive or interrupted session
A mobile device allows transmission of additional outgoing application data requests in response to occurrence of receipt of data transfer from a remote entity, user input in response to a prompt displayed to the user, and a change in a background status of an application executing on the mobile device. Additional outgoing application data requests are foreground application requests.
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
Systems and methods for API-based device management for ad blocking on computing device is disclosed. API-based device management is performed using API and other method hooking within a virtual container. By directly intercepting API calls and other method calls at the application layer, no interception of network traffic is necessary, and there is no need to support network protocols at the network layer, because data can be received directly from an application. The identity of the APIs or methods to intercept and hook may be determined by analyzing a constructor or a signature in the application package.
A system includes a first computing device client associated with a first user in a community of users operable to send content to publish to a data aggregation server. The data aggregation server is operable to receive the content to publish from the first computing device client, host a first user profile associated with the first user of the first computing device client, the first user profile identifying a targeted recipient in the community of users, and disseminate automatically the content received from the first computing device client to a second computing device client associated with the targeted recipient, without receiving input from the first computing device client explicitly specifying the targeted recipient to whom the content is disseminated.
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
H04L 51/214 - Monitoring or handling of messages using selective forwarding
Providing a mobile device with web-based access to data objects is disclosed. Authentication information is sent from a mobile device to a relay server. The relay server executes a connection application to establish a connection to a web access server. The authentication information is provided to the web access server associated with a data store hosting a data object. Upon authentication, the data object is provided to the relay server from the data store. The data object is then provided to the mobile device.
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A system includes a first computing device client associated with a first user in a community of users operable to send content to publish to a data aggregation server. The data aggregation server is operable to receive the content to publish from the first computing device client, host a first user profile associated with the first user of the first computing device client, the first user profile identifying a targeted recipient in the community of users, and disseminate automatically the content received from the first computing device client to a second computing device client associated with the targeted recipient, without receiving input from the first computing device client explicitly specifying the targeted recipient to whom the content is disseminated.
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
H04L 51/214 - Monitoring or handling of messages using selective forwarding
A method for conserving device and/or network resources is provided herein. The method includes detecting a wakelock operating on a mobile device and determining a consumption of one of a power or radio usage attributed to the detected wakelock. The method further includes determining a criticality related to user experience for the detected wakelock and releasing the detected wakelock based on the determined consumption and criticality. Related systems and mobile devices are also disclosed.
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
A system includes a first computing device client associated with a first user in a community of users operable to send content to publish to a data aggregation server. The data aggregation server is operable to receive the content to publish from the first computing device client, host a first user profile associated with the first user of the first computing device client, the first user profile identifying a targeted recipient in the community of users, and disseminate automatically the content received from the first computing device client to a second computing device client associated with the targeted recipient, without receiving input from the first computing device client explicitly specifying the targeted recipient to whom the content is disseminated.
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
H04L 51/214 - Monitoring or handling of messages using selective forwarding
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A method and system are for generating a report for delivery to or access or query by a network operator by determining, by a server-side proxy, optimization efficiency for traffic in a wireless network, tracking, by the server-side proxy, user-related information in the wireless network, generating, based on at least one of the optimization efficiency and the user-related information, a report for delivery to or access by an operator of the wireless network, the report including an alert of viral take-up of a new application, and performing, by the server-side proxy, traffic optimization functions alleviating traffic in the wireless network.
H04L 67/289 - Intermediate processing functionally located close to the data consumer application, e.g. in same machine, in same home or in same sub-network
H04L 43/065 - Generation of reports related to network devices
H04L 43/062 - Generation of reports related to network traffic
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 41/083 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for increasing network speed
29.
INTELLIGENT ALARM MANIPULATOR AND RESOURCE TRACKER
Systems and methods for tracking resources used by triggers such as alarms and timers that are used by mobile applications to schedule tasks and intelligently manipulating the timing of the triggers to optimize usage of resources such as, but not limited to: network, battery, CPU and/or memory are disclosed. In one embodiment, an intelligent alarm manipulator and resource tracker tracks triggers from multiple applications on a mobile device and corresponding use of resources resulting from the triggers on a mobile device. The intelligent alarm manipulator and resource tracker further determines correlations between the triggers and the corresponding use of the resources on the mobile device and manipulates, based on the correlations, timing or frequency of some or all of the triggers to optimize the use of the resources on the mobile device.
A method for forwarding an e-mail message from an e-mail server to a mobile terminal is provided. An e-mail address of the mobile terminal is associated with an identifier and encryption information, receiving the e-mail message associated with the e-mail address and sent by the e-mail server. The method includes encrypting the e-mail message using the encryption information associated with the e-mail address and transmitting the encrypted e-mail message to the mobile terminal.
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A method of buffering application data operable at a delivery control server is provided. Related systems and computer program products are also provided.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06F 15/167 - Interprocessor communication using a common memory, e.g. mailbox
H04W 72/51 - Allocation or scheduling criteria for wireless resources based on terminal or device properties
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04L 67/289 - Intermediate processing functionally located close to the data consumer application, e.g. in same machine, in same home or in same sub-network
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
H04L 67/564 - Enhancement of application control based on intercepted application data
33.
Offloading application traffic to a shared communication channel for signal optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
A method of reducing network traffic includes blocking, at a mobile device, a first channel to reduce network signaling in a network and to reduce battery consumption. The first channel includes a non-common channel. The method includes offloading application traffic of an application onto a second channel. The second channel may include a common channel. The method may include monitoring the application traffic of the application over the second channel, unblocking the first channel based on the monitored application traffic so that the application can perform an action, and re-blocking the first channel after the action has been completed. The method may include unblocking the first channel when user activity is detected, wherein the user activity includes whether the mobile device is being interacted with.
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
Systems and methods for tracking resources used by triggers such as alarms and timers that are used by mobile applications to schedule tasks and intelligently manipulating the timing of the triggers to optimize usage of resources such as, but not limited to: network, battery, CPU and/or memory are disclosed. In one embodiment, an intelligent alarm manipulator and resource tracker tracks triggers from multiple applications on a mobile device and corresponding use of resources resulting from the triggers on a mobile device. The intelligent alarm manipulator and resource tracker further determines correlations between the triggers and the corresponding use of the resources on the mobile device and manipulates, based on the correlations, timing or frequency of some or all of the triggers to optimize the use of the resources on the mobile device.
A mobile device allows transmission of additional outgoing application data requests in response to occurrence of receipt of data transfer from a remote entity, user input in response to a prompt displayed to the user, and a change in a background status of an application executing on the mobile device. Additional outgoing application data requests are foreground application requests.
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
Systems and methods for API-based device management for ad blocking on computing device is disclosed. API-based device management is performed using API and other method hooking within a virtual container. By directly intercepting API calls and other method calls at the application layer, no interception of network traffic is necessary, and there is no need to support network protocols at the network layer, because data can be received directly from an application. The identity of the APIs or methods to intercept and hook may be determined by analyzing a constructor or a signature in the application package.
Providing a mobile device with web-based access to data objects is disclosed. Authentication information is sent from a mobile device to a relay server. The relay server executes a connection application to establish a connection to a web access server. The authentication information is provided to the web access server associated with a data store hosting a data object. Upon authentication, the data object is provided to the relay server from the data store. The data object is then provided to the mobile device.
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
A system includes a first computing device client associated with a first user in a community of users operable to send content to publish to a data aggregation server. The data aggregation server is operable to receive the content to publish from the first computing device client, host a first user profile associated with the first user of the first computing device client, the first user profile identifying a targeted recipient in the community of users, and disseminate automatically the content received from the first computing device client to a second computing device client associated with the targeted recipient, without receiving input from the first computing device client explicitly specifying the targeted recipient to whom the content is disseminated.
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
H04L 51/214 - Monitoring or handling of messages using selective forwarding
A system with distributed proxy for reducing traffic in a wireless network satisfies data requests made by a mobile application. The system includes a mobile device having a local proxy for intercepting a data request made by the mobile application. The local proxy simulates application server responses for the mobile application on the mobile device for data requests where responses are available in the local cache. A proxy server is coupled to the mobile device and an application server to which the data request is made. The proxy server is able to communicate with the local proxy. The local proxy forwards the data request to the proxy server for transmission to the application server for a response to the data request. The proxy server queries the application server for any changes to the data request that the mobile application has previously made and notifies the local proxy of such changes.
H04W 88/18 - Service support devices; Network management devices
H04L 47/122 - Avoiding congestion; Recovering from congestion by diverting traffic away from congested entities
H04L 47/25 - Flow control; Congestion control with rate being modified by the source upon detecting a change of network conditions
H04L 65/65 - Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
H04L 67/2885 - Hierarchically arranged intermediate devices, e.g. for hierarchical caching
H04L 67/289 - Intermediate processing functionally located close to the data consumer application, e.g. in same machine, in same home or in same sub-network
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
H04L 67/5683 - Storage of data provided by user terminals, i.e. reverse caching
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 28/02 - Traffic management, e.g. flow control or congestion control
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
H04W 4/16 - Communication-related supplementary services, e.g. call-transfer or call-hold
H04M 3/487 - Arrangements for providing information services, e.g. recorded voice services or time announcements
H04W 4/20 - Services signalling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
45.
Offloading application traffic to a shared communication channel for signal optimization in a wireless network for traffic uttilizing proprietary and non-proprietary protocols
A method of reducing network traffic includes blocking, at a mobile device, a first channel to reduce network signaling in a network and to reduce battery consumption. The first channel includes a non-common channel. The method includes offloading application traffic of an application onto a second channel. The second channel may include a common channel. The method may include monitoring the application traffic of the application over the second channel, unblocking the first channel based on the monitored application traffic so that the application can perform an action, and re-blocking the first channel after the action has been completed. The method may include unblocking the first channel when user activity is detected, wherein the user activity includes whether the mobile device is being interacted with.
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A method of optimizing traffic on a mobile device includes determining that an application is inactive based on historical behavior of the application and blocking traffic originating from or directed towards the application that is determined to be inactive based on historical behavior. A related mobile device is also provided.
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 28/02 - Traffic management, e.g. flow control or congestion control
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A method for IP [=Internet Protocol] communication between a mobile terminal and its correspondent node in a mobile radio network. The method comprises establishing an IP connection between the mobile terminal and its correspondent node. After detecting a period of inactivity in the IP connection, keep-alive messages are sent via the IP connection at predetermined intervals, which are varied. The method comprises monitoring the lengths of several periods of inactivity at which the mobile radio network disconnects the IP connection.
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
H04L 43/103 - Active monitoring, e.g. heartbeat, ping or trace-route with adaptive polling, i.e. dynamically adapting the polling rate
H04L 67/145 - Termination or inactivation of sessions, e.g. event-controlled end of session avoiding end of session, e.g. keep-alive, heartbeats, resumption message or wake-up for inactive or interrupted session
H04W 52/44 - TPC being performed in particular situations in connection with interruption of transmission
H04W 76/11 - Allocation or use of connection identifiers
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A mobile device allows transmission of additional outgoing application data requests in response to occurrence of receipt of data transfer from a remote entity, user input in response to a prompt displayed to the user, and a change in a background status of an application executing on the mobile device. Additional outgoing application data requests are foreground application requests.
A method of buffering application data operable at a delivery control server is provided. Related systems and computer program products are also provided.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A system with distributed proxy for reducing traffic in a wireless network satisfies data requests made by a mobile application. The system includes a mobile device having a local proxy for intercepting a data request made by the mobile application. The local proxy simulates application server responses for the mobile application on the mobile device for data requests where responses are available in the local cache. A proxy server is coupled to the mobile device and an application server to which the data request is made. The proxy server is able to communicate with the local proxy. The local proxy forwards the data request to the proxy server for transmission to the application server for a response to the data request. The proxy server queries the application server for any changes to the data request that the mobile application has previously made and notifies the local proxy of such changes.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 88/18 - Service support devices; Network management devices
H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04W 76/25 - Maintenance of established connections
H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
A system with distributed proxy for reducing traffic in a wireless network satisfies data requests made by a mobile application. The system includes a mobile device having a local proxy for intercepting a data request made by the mobile application. The local proxy simulates application server responses for the mobile application on the mobile device for data requests where responses are available in the local cache. A proxy server is coupled to the mobile device and an application server to which the data request is made. The proxy server is able to communicate with the local proxy. The local proxy forwards the data request to the proxy server for transmission to the application server for a response to the data request. The proxy server queries the application server for any changes to the data request that the mobile application has previously made and notifies the local proxy of such changes.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 88/18 - Service support devices; Network management devices
H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04W 76/25 - Maintenance of established connections
A mobile device allows transmission of additional outgoing application data requests in response to occurrence of receipt of data transfer from a remote entity, user input in response to a prompt displayed to the user, and a change in a background status of an application executing on the mobile device. Additional outgoing application data requests are foreground application requests.
G06F 16/957 - Browsing optimisation, e.g. caching or content distillation
59.
Offloading application traffic to a shared communication channel for signal optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
A method of reducing network traffic includes blocking, at a mobile device, a first channel to reduce network signaling in a network and to reduce battery consumption. The first channel includes a non-common channel. The method includes offloading application traffic of an application onto a second channel. The second channel may include a common channel. The method may include monitoring the application traffic of the application over the second channel, unblocking the first channel based on the monitored application traffic so that the application can perform an action, and re-blocking the first channel after the action has been completed. The method may include unblocking the first channel when user activity is detected, wherein the user activity includes whether the mobile device is being interacted with.
Providing a mobile device with web-based access to data objects is disclosed. Authentication information is sent from a mobile device to a relay server. The relay server executes a connection application to establish a connection to a web access server. The authentication information is provided to the web access server associated with a data store hosting a data object. Upon authentication, the data object is provided to the relay server from the data store. The data object is then provided to the mobile device.
A method and system are for generating a report for delivery to or access or query by a network operator by determining, by a server-side proxy, optimization efficiency for traffic in a wireless network, tracking, by the server-side proxy, user-related information in the wireless network, generating, based on at least one of the optimization efficiency and the user-related information, a report for delivery to or access by an operator of the wireless network, the report including an alert of viral take-up of a new application, and performing, by the server-side proxy, traffic optimization functions alleviating traffic in the wireless network.
H04L 12/24 - Arrangements for maintenance or administration
H04L 67/025 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
H04L 67/289 - Intermediate processing functionally located close to the data consumer application, e.g. in same machine, in same home or in same sub-network
H04L 43/065 - Generation of reports related to network devices
H04L 43/062 - Generation of reports related to network traffic
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 41/083 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for increasing network speed
H04L 67/564 - Enhancement of application control based on intercepted application data
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
62.
Dynamic adjustment of keep-alive messages for efficient battery usage in a mobile network
A method for IP [=Internet Protocol] communication between a mobile terminal and its correspondent node in a mobile radio network. The method comprises establishing an IP connection between the mobile terminal and its correspondent node. After detecting a period of inactivity in the IP connection, keep-alive messages are sent via the IP connection at predetermined intervals, which are varied. The method comprises monitoring the lengths of several periods of inactivity at which the mobile radio network disconnects the IP connection.
A method for conserving device and/or network resources is provided herein. The method includes detecting a wakelock operating on a mobile device and determining a consumption of one of a power or radio usage attributed to the detected wakelock. The method further includes determining a criticality related to user experience for the detected wakelock and releasing the detected wakelock based on the determined consumption and criticality. Related systems and mobile devices are also disclosed.
A system with distributed proxy for reducing traffic in a wireless network satisfies data requests made by a mobile application. The system includes a mobile device having a local proxy for intercepting a data request made by the mobile application. The local proxy simulates application server responses for the mobile application on the mobile device for data requests where responses are available in the local cache. A proxy server is coupled to the mobile device and an application server to which the data request is made. The proxy server is able to communicate with the local proxy. The local proxy forwards the data request to the proxy server for transmission to the application server for a response to the data request. The proxy server queries the application server for any changes to the data request that the mobile application has previously made and notifies the local proxy of such changes.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 88/18 - Service support devices; Network management devices
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04W 76/25 - Maintenance of established connections
A system for aggregating and managing PIM data from multiple sources is provided. By aggregating various sources of data, the present system allow for the bridging of networked communities and organizations. Limitations of data aggregation as a result of proprietary and/or protocol concerns are overcome through the development of trusted relationships amongst users of the data aggregation and management system.
Systems and methods for prediction of activity session for mobile network use optimization and user experience enhancement are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system for enhancing user experience with a mobile application on a mobile device including, using user activity characteristics at a mobile device and server activity characteristics of a host server to anticipate a future activity session at the mobile device and transferring impending content from the host server the mobile device to pre-cache content on the mobile device to support predicted data activity for the future activity session that has been predicted.
A digital content provider server comprises a memory and a processor configured for: receiving respective unique authentication tokens from each of a first device and a second device, and transferring to a content selection interface on the first device an indication of content available from a content provider, wherein the content selection interface is associated with an application installed on the first device. The memory and processor are further configured for: transmitting selected content to the first device in response to a user selection of content available from the content provider server at the first device, and automatically transmitting the selected content to the second device.
Systems and methods for prediction of activity session for mobile network use optimization and user experience enhancement are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system for enhancing user experience with a mobile application on a mobile device including, using user activity characteristics at a mobile device and server activity characteristics of a host server to anticipate a future activity session at the mobile device and transferring impending content from the host server the mobile device to pre-cache content on the mobile device to support predicted data activity for the future activity session that has been predicted.
A mobile device is configured for communicating over a shared channel and an application specific channel. The application specific channel is a channel for an application on the mobile device to communicate with an application server. The mobile device is further configured for blocking the application specific channel to offload traffic therefrom to the shared channel. The blocking occurs in response to a screen of the mobile device being off and the blocking includes blocking the application from accessing the application server over the application specific channel.
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 12/859 - Flow control actions based on the nature of the application, e.g. controlling web browsing or e-mail traffic
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A method for IP [=Internet Protocol] communication between a mobile terminal and its correspondent node in a mobile radio network. The method comprises establishing an IP connection between the mobile terminal and its correspondent node. After detecting a period of inactivity in the IP connection, keep-alive messages are sent via the IP connection at predetermined intervals, which are varied. The method comprises monitoring the lengths of several periods of inactivity at which the mobile radio network disconnects the IP connection.
A method and system are for generating a report for delivery to or access or query by a network operator by determining, by a server-side proxy, optimization efficiency for traffic in a wireless network, tracking, by the server-side proxy, user-related information in the wireless network, generating, based on at least one of the optimization efficiency and the user-related information, a report for delivery to or access by an operator of the wireless network, the report including an alert of viral take-up of a new application, and performing, by the server-side proxy, traffic optimization functions alleviating traffic in the wireless network.
Systems and methods for detecting and identifying malware/potentially harmful applications based on behavior characteristics of a mobile application are disclosed. One embodiment of a method of detecting a potentially harmful application includes detecting behavior characteristics of a mobile device and, based on those detected behavior characteristics, identifying one or more indicators that the mobile application is a potentially harmful application. Those indicators are then analyzed to determine whether the application is a potentially harmful application.
A mobile device having improved resource management predicts that a user is likely to access an application based on prior application access history while the user of the mobile device is inactive and a screen status of the mobile device is off. The mobile device communicates over an established multiplexed connection and a second connection is established while the established multiplexed connection remains connected. Data for the application is fetched based on the prediction. Data for the application is fetched over the second connection before the application is accessed.
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 88/18 - Service support devices; Network management devices
H04L 29/06 - Communication control; Communication processing characterised by a protocol
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A method for conserving device and/or network resources is provided herein. The method includes detecting a wakelock operating on a mobile device and determining a consumption of one of a power or radio usage attributed to the detected wakelock. The method further includes determining a criticality related to user experience for the detected wakelock and releasing the detected wakelock based on the determined consumption and criticality. Related systems and mobile devices are also disclosed.
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
A method of buffering application data operable at a delivery control server is provided. Related systems and computer program products are also provided.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
Systems and methods for prediction of activity session for mobile network use optimization and user experience enhancement are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system for enhancing user experience with a mobile application on a mobile device including, using user activity characteristics at a mobile device and server activity characteristics of a host server to anticipate a future activity session at the mobile device and transferring impending content from the host server the mobile device to pre-cache content on the mobile device to support predicted data activity for the future activity session that has been predicted.
A method of optimizing traffic on a mobile device includes determining that an application is inactive based on historical behavior of the application and blocking traffic originating from or directed towards the application that is determined to be inactive based on historical behavior. A related mobile device is also provided.
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 28/02 - Traffic management, e.g. flow control or congestion control
A system with distributed proxy for reducing traffic in a wireless network satisfies data requests made by a mobile application. The system includes a mobile device having a local proxy for intercepting a data request made by the mobile application. The local proxy simulates application server responses for the mobile application on the mobile device for data requests where responses are available in the local cache. A proxy server is coupled to the mobile device and an application server to which the data request is made. The proxy server is able to communicate with the local proxy. The local proxy forwards the data request to the proxy server for transmission to the application server for a response to the data request. The proxy server queries the application server for any changes to the data request that the mobile application has previously made and notifies the local proxy of such changes.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 88/18 - Service support devices; Network management devices
H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04W 76/25 - Maintenance of established connections
Systems and methods for tracking resources used by triggers such as alarms and timers that are used by mobile applications to schedule tasks and intelligently manipulating the timing of the triggers to optimize usage of resources such as, but not limited to: network, battery, CPU and/or memory are disclosed. In one embodiment, an intelligent alarm manipulator and resource tracker tracks triggers from multiple applications on a mobile device and corresponding use of resources resulting from the triggers on a mobile device. The intelligent alarm manipulator and resource tracker further determines correlations between the triggers and the corresponding use of the resources on the mobile device and manipulates, based on the correlations, timing or frequency of some or all of the triggers to optimize the use of the resources on the mobile device.
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
A method for managing applications configured for execution on a mobile device is provided. The method includes receiving one or more network access requests from one or more applications executing on the mobile device, determining that the mobile device is operating in a background mode, suppressing transmission to a network of the one or more network access requests based on the determination, and transmitting a subset of the one or more network access requests upon transition out of the background mode.
A system with distributed proxy for reducing traffic in a wireless network satisfies data requests made by a mobile application. The system includes a mobile device having a local proxy for intercepting a data request made by the mobile application. The local proxy simulates application server responses for the mobile application on the mobile device for data requests where responses are available in the local cache. A proxy server is coupled to the mobile device and an application server to which the data request is made. The proxy server is able to communicate with the local proxy. The local proxy forwards the data request to the proxy server for transmission to the application server for a response to the data request. The proxy server queries the application server for any changes to the data request that the mobile application has previously made and notifies the local proxy of such changes.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 88/18 - Service support devices; Network management devices
H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04W 76/25 - Maintenance of established connections
A mobile device which improves network resource utilization in a wireless network includes a first power management mode that is entered in response to instructions to enter the first power management mode that are provided at a user interface of the mobile device. The mobile device has a second power management mode that is entered based on a detected activity status that includes a time that a screen of the mobile device has been idle exceeding a time. Various optimization techniques are utilized while in either of the power management modes.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 88/18 - Service support devices; Network management devices
H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04W 76/25 - Maintenance of established connections
A system with distributed proxy for reducing traffic in a wireless network satisfies data requests made by a mobile application. The system includes a mobile device having a local proxy for intercepting a data request made by the mobile application. The local proxy simulates application server responses for the mobile application on the mobile device for data requests where responses are available in the local cache. A proxy server is coupled to the mobile device and an application server to which the data request is made. The proxy server is able to communicate with the local proxy. The local proxy forwards the data request to the proxy server for transmission to the application server for a response to the data request. The proxy server queries the application server for any changes to the data request that the mobile application has previously made and notifies the local proxy of such changes.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
H04W 88/18 - Service support devices; Network management devices
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04W 76/25 - Maintenance of established connections
H04W 84/04 - Large scale networks; Deep hierarchical networks
A method and related hardware for improved search engine results delivered to multiple devices associated with a same user is provided. The multiple devices may each have a user profile associated therewith and the search results delivered may be based on the user profile.
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
A mobile device having an established multiplexed connection for optimizing communications is configured for communicating over the established multiplexed connection, predicting an activity session based on application access history, and fetching data for an application before the activity session based on the predicted activity session. A second connection is established that is other than the established multiplexed connection with the mobile device. The fetched data is transmitted over the second connection.
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
H02G 1/08 - Methods or apparatus specially adapted for installing, maintaining, repairing, or dismantling electric cables or lines for laying cables, e.g. laying apparatus on vehicle through tubing or conduit, e.g. rod or draw wire for pushing or pulling
H04L 29/06 - Communication control; Communication processing characterised by a protocol
Offloading application traffic to a shared communication channel for signal optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
A method for conserving network and battery usage is provided. The method includes determining that a device is communicating over at least two overlapping push channels and blocking one of the push channels to eliminate or reduce overlap between the at least two overlapping push channels. Related systems are also provided.
Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
Systems and methods for prediction of activity session for mobile network use optimization and user experience enhancement are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system for enhancing user experience with a mobile application on a mobile device including, using user activity characteristics at a mobile device and server activity characteristics of a host server to anticipate a future activity session at the mobile device and transferring impending content from the host server the mobile device to pre-cache content on the mobile device to support predicted data activity for the future activity session that has been predicted.
A method for managing applications configured for execution on a mobile device is provided. The method includes receiving one or more network access requests from one or more applications executing on the mobile device, determining that the mobile device is operating in a background mode, suppressing transmission to a network of the one or more network access requests based on the determination, and transmitting a subset of the one or more network access requests upon transition out of the background mode.
A method for managing applications configured for execution on a mobile device is provided. The method includes receiving one or more network access requests from one or more applications executing on the mobile device, determining that the mobile device is operating in a background mode, suppressing transmission to a network of the one or more network access requests based on the determination, and transmitting a subset of the one or more network access requests upon transition out of the background mode.
System and methods for authenticating access to multiple data stores are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method receives a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
Systems and methods for maintaining an IP (Internet protocol) connection in a mobile network are disclosed. Techniques are disclosed wherein an optimal keep-alive interval is determined, and dynamic adjustments of keep-alive message interval are employed to prevent detection and counter measure. Keep-Alive schedule information may be determined at a first mobile terminal for a network, and subsequently used for a second mobile terminal when the second mobile terminal encounters that same network. In some embodiments, the Keep-Alive schedule information is stored at a network-node device. In some embodiments, the first mobile terminal and the second mobile terminal are cellular phones.
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
A system includes a first computing device client associated with a first user in a community of users operable to send content to publish to a data aggregation server. The data aggregation server is operable to receive the content to publish from the first computing device client, host a first user profile associated with the first user of the first computing device client, the first user profile identifying a targeted recipient in the community of users, and disseminate automatically the content received from the first computing device client to a second computing device client associated with the targeted recipient, without receiving input from the first computing device client explicitly specifying the targeted recipient to whom the content is disseminated.