Seven Networks, Inc. Patent applications |
Patent application number | Title | Published |
20150372987 | SECURE END-TO-END TRANSPORT THROUGH INTERMEDIARY NODES - A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key. | 12-24-2015 |
20150241941 | Mobile traffic optimization and coordination and user experience enhancement - Systems and methods for prediction of activity session for mobile network use optimization and user experience enhancement are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system for enhancing user experience with a mobile application on a mobile device including, using user activity characteristics at a mobile device and server activity characteristics of a host server to anticipate a future activity session at the mobile device and transferring impending content from the host server the mobile device to pre-cache content on the mobile device to support predicted data activity for the future activity session that has been predicted. | 08-27-2015 |
20150023162 | EXTENDING DELAY TOLERANCE OF MOBILE APPLICATIONS FOR OPTIMIZING MOBILE TRAFFIC MANAGEMENT - Systems and methods for extending delay tolerance of mobile applications to optimize mobile traffic management are disclosed. In a mobile device, network stack timers or protocol stack timers are modified to extend delay tolerance of applications for radio alignment. In an embodiment, tolerance of mobile applications on a mobile device to delay in establishing a connection to a wireless network is extended by an application or a local proxy on a mobile device. Based on the tolerance that is extended, requests intercepted from the mobile applications are aggregated, over a period of time, such that transfer of the requests intercepted during the period of time is delayed. This minimizes the number of times the mobile device connects to the network, reducing the power consumption on the mobile device and unnecessary signaling in the network. | 01-22-2015 |
20150023161 | MODIFYING SYSTEM TIMERS FOR OPTIMIZING MOBILE TRAFFIC MANAGEMENT - Systems and methods for optimizing mobile traffic management are disclosed. In a mobile device, network stack timers or protocol stack timers are modified to extend delay tolerance of applications for radio alignment. In an embodiment, using a variable gating delay, that takes into consideration the delay tolerance of applications that is extended and other information such as radio state information, are used to align and transfer outgoing traffic from multiple applications to one or more application servers, receive requests and/or responses from one or more application servers or a carrier-side proxy server to minimize the number of times the mobile device connects to the network, reducing the power consumption on the mobile device and unnecessary signaling in the network. | 01-22-2015 |
20150012257 | MODELING NETWORK SIGNALING IN A MOBILE NETWORK - The disclosed technology includes systems and methods for modeling signaling and/or connections in a mobile network, and specifically, the benefits of any optimization technique on the traffic including signals and/or connections in the mobile network. Embodiments can allocate signaling to specific applications (e.g., to determine which applications are chatty and which can cause problematic signaling), and/or to further model the optimizations or savings utilizing the disclosed traffic optimization technology. In some embodiments, to enable or enhance the performance of the data traffic and signal optimization for the network, the disclosed technology includes one or more fields (e.g., an expanded “CRCS” fields) that are calculated by, for example, a CRCS analysis core module, to define and identify at least: (1) whether a transaction causes a connection (and thus signaling); and (2) the number of connections that are reduced or saved by the disclosed embodiments of distributed caching and proxy system. | 01-08-2015 |
20140362712 | RADIO OR NETWORK EVALUATION FOR SELECTION BASED ON MEASUREMENTS USING APPLICATION LAYER PROTOCOLS AT A MOBILE DEVICE - In one embodiment, a method comprises measuring a set of parameters for each of the available networks using an application layer protocol (e.g., HTTP). The method further comprises determining an overall quality level for each of the available networks based on the parameters, and choosing the network based on the overall quality level. In some embodiments, the set of parameters are measured by communicating with each of a plurality of predetermined servers within a respective network. Among other advantages, embodiments disclosed herein enable a quantified approach to user experience estimation and application-level Quality of Experience (QoE) measurements, which can serve as bases for selection of radios for the applications. | 12-11-2014 |
20140321448 | DETECTION AND REPORTING OF KEEPALIVE MESSAGES FOR OPTIMIZATION OF KEEPALIVE TRAFFIC IN A MOBILE NETWORK - Detection of network transactions or keepalives for maintaining long lived connections are disclosed. A keepalive detector can detect keepalive traffic based on keepalive parameters determined from an analysis of socket level network communication log data that record data transfer events including data sent from mobile applications or clients on a mobile device and data received by the mobile applications or clients on the mobile device, timing characteristics, protocol types, etc. Various statistical analyses can be performed on the network communication data to detect keepalives, taking into account variability in intervals of the data transfer events and sizes of data sent and received on each event. The keepalive detector can also detect keepalives from stream data on a mobile device by analyzing socket level communication messages including timing characteristics and amount of data transferred to detect keepalives and report keepalives using a data structure. | 10-30-2014 |
20140310709 | TEMPORARY OR PARTIAL OFFLOADING OF MOBILE APPLICATION FUNCTIONS TO A CLOUD-BASED ENVIRONMENT - Techniques for temporarily and/or partially offloading mobile applications to one or more remote virtual machines in a server include establishing an application copy of a mobile application installed on a mobile device at a remote virtual machine, suspending the mobile application on the mobile device and offloading operations of the mobile application to the application copy at the remote virtual machine for a period of time. Suspending the mobile application and offloading its operations to the remote virtual machine for the period of time reduces consumption of resources on the mobile device. The virtual machine executes the application copy in the same manner the mobile device would execute the mobile application and transfers data from the execution to the mobile application at the end of the period of time to allow the mobile application to update itself and resume its operation without any loss of data or functionality. | 10-16-2014 |
20140310386 | ADAPTIVE DOWNLOADING OR STREAMING TO CONSERVE MOBILE DEVICE OR NETWORK RESOURCES - Embodiments of the present disclosure include techniques for optimization on downloading/streaming activities of media and/or other files (e.g., on a local client, or a local proxy on a mobile device). An example of such downloading/streaming is a user accessing media content including video and/or audio content using a mobile device such as a smart phone, a tablet, or a “phablet,” etc. | 10-16-2014 |
20140289745 | INTELLIGENT ALARM MANIPULATOR AND RESOURCE TRACKER - Systems and methods for tracking resources used by triggers such as alarms and timers that are used by mobile applications to schedule tasks and intelligently manipulating the timing of the triggers to optimize usage of resources such as, but not limited to: network, battery, CPU and/or memory are disclosed. In one embodiment, an intelligent alarm manipulator and resource tracker tracks triggers from multiple applications on a mobile device and corresponding use of resources resulting from the triggers on a mobile device. The intelligent alarm manipulator and resource tracker further determines correlations between the triggers and the corresponding use of the resources on the mobile device and manipulates, based on the correlations, timing or frequency of some or all of the triggers to optimize the use of the resources on the mobile device. | 09-25-2014 |
20140254447 | DYNAMIC ADJUSTMENT OF KEEP-ALIVE MESSAGES FOR EFFICIENT BATTERY USAGE IN A MOBILE NETWORK - Systems and methods for dynamic adjustment of keep-alive message intervals in a mobile network are disclosed. One embodiment of maintaining an IP connection between a mobile terminal and a network node over a network includes, detecting a rate with which the client-slide request are made from the mobile terminal, detecting a rate with which the client-slide request are made from the mobile terminal, sending, by the network node, keep-alive messages to the mobile terminal in an absence of network traffic through the IP connection between the mobile terminal and the network node, and/or further optimizing the time intervals between the keep-alive messages based on a cost to send the keep-alive messages in the network. | 09-11-2014 |
20140254359 | MOBILE NETWORK CONGESTION RECOGNITION FOR OPTIMIZATION OF MOBILE TRAFFIC - Systems and methods for mobile network congestion recognition for optimization of mobile traffic are disclosed. A mobile device having a local proxy equipped with congestion recognition capabilities can sample time consumed to establish data connection between the mobile device and the mobile network, collect data including at least one of signal strength data, cell identifier, and location area code associated with the data connection between the mobile device and the mobile network, and anticipate network congestion, based at least on the time consumed and the collected data. On detecting mobile network congestion, the local proxy can apply a blocking policy to block all or low priority traffic from signaling the congested mobile network to ease the congestion. | 09-11-2014 |
20140215082 | SIGNALING OPTIMIZATION IN A WIRELESS NETWORK FOR TRAFFIC UTILIZING PROPRIETARY AND NON-PROPRIETARY PROTOCOLS - An architecture for optimizing signaling for arbitrary proprietary and non-proprietary protocols. In one embodiment, a Transmission Control Protocol (TCP) stream is passed as a byte stream from an application to a local proxy over a first session, from the local proxy to a proxy server over a second TCP session, and from the proxy server to a content server over a third TCP session. The local proxy observes and identifies patterns within the byte stream, without being aware of the underlying protocol. Once a pattern is identified, the second TCP session is torn down such that the first TCP session replays the pattern to the application, and third TCP session replays the pattern to the content server. Once either side detects a change in the pattern, the second TCP session is re-established to deliver the changed content to the other end. | 07-31-2014 |
20140204816 | Mobile device with application or context aware fast dormancy - Systems and methods for improving battery life and transmission efficiency of mobile devices are disclosed. Some embodiments provide for application and/or context aware fast dormancy on a mobile device or user equipment (UE) and/or via a proxy server. By incorporating application and context information, e.g., when an application opens a connection, what kind of applications are present, how the application normally behaves and whether the application is running in background or transmitting background data, embodiments provide for an improved and enhanced fast dormancy operation. | 07-24-2014 |
20140204815 | Application or context aware fast dormancy - Systems and methods for improving battery life and transmission efficiency of mobile devices are disclosed. Some embodiments provide for application and/or context aware fast dormancy on a mobile device or user equipment (UE) and/or via a proxy server. By incorporating application and context information, e.g., when an application opens a connection, what kind of applications are present, how the application normally behaves and whether the application is running in background or transmitting background data, embodiments provide for an improved and enhanced fast dormancy operation. | 07-24-2014 |
20140177497 | MANAGEMENT OF MOBILE DEVICE RADIO STATE PROMOTION AND DEMOTION - Embodiments of the present disclosure include systems and methods for management of mobile device radio state. In some embodiments, a method, which can be implemented on a system, allows a network component (e.g., the policy and charging rules function in a UMTS network) to determine whether a mobile device is idle or active. Based on this determination, the network component may modify the behavior of a network element (e.g., a base station, eNode B or Node B) in relation to promotion or demotion of the mobile device's radio state. In some embodiments, the disclosed system can include a client side component on the mobile device which can determine criteria to be used by the network component to govern and optimize changes in mobile device radio state in a manner that conserves device and network resources. | 06-26-2014 |
20140177496 | SYSTEMS AND METHODS FOR APPLICATION MANAGEMENT OF MOBILE DEVICE RADIO STATE PROMOTION AND DEMOTION - Embodiments of the present disclosure include systems and methods for management of mobile device radio state. In some embodiments, a method, which can be implemented on a system, allows a network component (e.g., the policy and charging rules function in a UMTS network) to determine whether a mobile device is idle or active. Based on this determination, the network component may modify the behavior of a network element (e.g., a base station, eNode B or Node B) in relation to promotion or demotion of the mobile device's radio state. In some embodiments, the disclosed system can include a client side component on the mobile device which can determine criteria to be used by the network component to govern and optimize changes in mobile device radio state in a manner that conserves device and network resources. | 06-26-2014 |
20140133293 | TRIGGERING CONGESTION CONTROL IN A MANNER SUCH THAT THE MOBILE DEVICE RADIO IS APPLICATION AWARE - Currently, the radio on the device is the only one aware of network congestion while applications are not. At the same time, only the application is aware of the criticality of information it needs to send across the network. In order to address mobile network congestion more effectively, device radio needs to become application aware or application becomes radio aware. This way, the device radio knows the priority of the application traffic and does not blindly block critical information while allowing non critical information to be transferred or the application knows that the network is congested and uses it efficiently. The current congestion management mechanisms have their triggers and corrective actions limited to the device radio level without any regard to application. To address this problem, the disclosed technology includes a solution for congestion management where the trigger is on radio level while corrective measures are at IP/application layer. | 05-15-2014 |
20140018033 | DYNAMIC BANDWIDTH ADJUSTMENT FOR BROWSING OR STREAMING ACTIVITY IN A WIRELESS NETWORK BASED ON PREDICTION OF USER BEHAVIOR WHEN INTERACTING WITH MOBILE APPLICATIONS - System and method of dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications are disclosed. One embodiment includes mobile device which throttles radio use based on user habit. The mobile device is able to throttle the radio between high and lowered power states based on the user habit of a user using the mobile device in mobile usage sessions relating to, for example, browsing activity or content streaming activity, where, the radio can be throttled among three power states when connected to a 3G wireless network or throttled among two power states when connected to a 4G or LTE network/pre-LTE. | 01-16-2014 |
20130316675 | FACILITATION OF MOBILE OPERATOR BILLING BASED ON WIRELESS NETWORK TRAFFIC MANAGEMENT AND TRACKING OF DESTINATION ADDRESS IN CONJUNCTION WITH BILLING POLICIES - Systems and methods for wireless network traffic routing through traffic optimization and tracking of destination and/or origination addresses in conjunction with billing policies to facilitate service provider billing is disclosed. Since the distributed proxy system, which includes, for example, a proxy server and/or a local proxy on the mobile device, can intercept traffic to and/or from the mobile device, the intercepted traffic may or may not access the wireless network and/or reach the addressed destination. Thus, for outgoing and incoming requests directed from or directed to the mobile device, the distributed proxy system tracks and stores a destination address (e.g., a destination IP address). The proxy server can extract and store the origination address for each incoming communication for various mobile devices and apply applicable billing policies such that a service provider can bill or otherwise manage incoming communications to the mobile devices. | 11-28-2013 |
20130315161 | WIRELESS NETWORK TRAFFIC ROUTING THROUGH TRAFFIC OPTIMIZATION AND TRACKING OF DESTINATION ADDRESS TO FACILITATE SERVICE PROVIDER BILLING - Systems and methods for wireless network traffic routing through traffic optimization and tracking of destination and/or origination addresses to facilitate service provider billing is disclosed. Since the distributed proxy system, which includes, for example, a proxy server and/or a local proxy on the mobile device, can intercept traffic to and/or from the mobile device, the intercepted traffic may or may not access the wireless network and/or reach the addressed destination. Thus, for outgoing and incoming requests directed from or directed to the mobile device, the distributed proxy system tracks and stores a destination address (e.g., a destination IP address). The proxy server can extract and store the origination address for each incoming communication for various mobile devices such that a service provider can bill or otherwise manage incoming communications to the mobile devices. | 11-28-2013 |
20130268656 | INTELLIGENT CUSTOMER SERVICE/CALL CENTER SERVICES ENHANCED USING REAL-TIME AND HISTORICAL MOBILE APPLICATION AND TRAFFIC-RELATED STATISTICS COLLECTED BY A DISTRIBUTED CACHING SYSTEM IN A MOBILE NETWORK - Systems and methods of intelligent customer service/call center services enhanced using real-time and historical mobile application and traffic-related statistics collected by a distributed caching system in a mobile network are disclosed. The data can be tracked by a client-side and/or a server-side reporting engine and usage analytics engine. Reports can also be generated by the system from the data and provided to the customer service/call center, such as trend charts showing optimization efficiency of traffic over a network and battery consumption vs. application load for a mobile device as a function of time. | 10-10-2013 |
20130268655 | METHOD AND SYSTEM FOR MANAGEMENT OF A VIRTUAL NETWORK CONNECTION WITHOUT HEARTBEAT MESSAGES - Systems and methods for management of a network connection without heartbeat messages are disclosed. One embodiment of a distributed proxy system performs a method for the communication of state between a client and a server in a distributed content delivery network using a state map. The state map sets a predicted communication correspondence frequency and thus eliminates the use or need of heart beat messages to manage session state and/or convey health status of system components. | 10-10-2013 |
20130267209 | ENHANCED CUSTOMER SERVICE FOR MOBILE CARRIERS USING REAL-TIME AND HISTORICAL MOBILE APPLICATION AND TRAFFIC OR OPTIMIZATION DATA ASSOCIATED WITH MOBILE DEVICES IN A MOBILE NETWORK - Systems and methods of enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network are disclosed. The data can be tracked by a client-side and/or a server-side reporting engine and usage analytics engine. Reports can also be generated by the system from the data and provided to the customer service/call center, such as trend charts showing optimization efficiency of traffic over a network and battery consumption vs. application load for a mobile device as a function of time. | 10-10-2013 |
20130229976 | MOBILE DEVICE WHICH HANDS OVER CONNECTIVITY FROM ONE NETWORK CONNECTION TO ANOTHER NETWORK CONNECTION WITHOUT INTERRUPTION IN APPLICATION DATA FLOW AND METHODS THEREFOR - Mobile devices which hand over connectivity from one network connection to another network connection without interruption in application data flow and methods therefor are disclosed. One embodiment further includes, a system for managing handover from a first wireless connection to a second wireless connection for applications, the system including, a network interface operable to communicate with the first wireless network and the second wireless network, wherein the network interface is operable to receive first data from a first wireless network and receive second data for the application from a second wireless network and generate a continuous data flow for applications when handover from the first wireless network to the second wireless network occurs. | 09-05-2013 |
20130229270 | PROVIDING DATA TO A MOBILE APPLICATION ACCESSIBLE AT A MOBILE DEVICE VIA DIFFERENT NETWORK CONNECTIONS WITHOUT INTERRUPTION - System and method of providing data to a mobile application accessible at a mobile device via different network connections without interruption are disclosed. The method, which may be implemented on a system includes, receiving data for the mobile application over a network connection different from a first network connection, and/or providing the data received over the network connection including any other data received from the first network connection, to the mobile application in a manner that is without interruption in data flow. The data is provided to the mobile application without interruption even when connections to the different network connections require change in IP addresses. | 09-05-2013 |
20130205366 | DYNAMIC CATEGORIZATION OF APPLICATIONS FOR NETWORK ACCESS IN A MOBILE NETWORK - Systems and methods of dynamic categorization of applications for network use and access in a mobile network are disclosed. Using application profile information, applications can be categorized into one of multiple categories that define restrictions on the application's access to the wireless network or cellular network. One example of such categories is the concept of black, white and grey listings. The “white” listed applications may be always allowed access, “black” listed application may never or almost never be granted network access (e.g., application may be malware like or otherwise consumes large amounts of network/device resources), and grey listed applications may be granted access based on one or more criteria. | 08-08-2013 |
20130203433 | USER AS AN END POINT FOR PROFILING AND OPTIMIZING THE DELIVERY OF CONTENT AND DATA IN A WIRELESS NETWORK - System and method of using user as an end point for profiling and optimizing delivery of content and/or data in a wireless network are disclosed. One embodiment includes a method of content consumption based resource allocation to a user in a wireless network. The method, which may be implemented on a system includes, tracking content consumption in sessions of mobile usage for a user, aggregating or computing statistical data related to the content consumption in the sessions of the mobile usage, and/or facilitating control of the resource allocated to the user in the wireless network based on the statistical data of the content consumption of the user's mobile usage. The sessions of mobile usage for the user can be tracked across multiple mobile devices. | 08-08-2013 |
20130191476 | ELECTRONIC-MAIL FILTERING FOR MOBILE DEVICES - Systems and methods for dynamic electronic-mail filtering for mobile devices are provided. Incoming e-mail messages are received and provided to an e-mail inbox associated with the intended recipient. Those e-mail messages are evaluated to determine whether they may be desirable to the recipient. Desirability of an e-mail may be determined by such factors as the e-mail address of origin or key words in subject line. E-mail messages determined to be desirable are provided to a mobile device associated with the recipient. The recipient may then be notified concerning the desirable messages. | 07-25-2013 |
20130182572 | RADIO-AWARENESS OF MOBILE DEVICE FOR SENDING SERVER-SIDE CONTROL SIGNALS USING A WIRELESS NETWORK OPTIMIZED TRANSPORT PROTOCOL - System and method of radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol are disclosed. One embodiment includes a method of sending a message over an alternate channel to a mobile device in the presence of an open TCP connection with a mobile device, including sending the message over the alternate channel to the mobile device, without utilizing the open TCP connection, responsive to determining that a timing criteria has been met. The alternate channel utilized need not cause a radio of the mobile device to switch on. | 07-18-2013 |
20130178195 | DETECTION AND MANAGEMENT OF USER INTERACTIONS WITH FOREGROUND APPLICATIONS ON A MOBILE DEVICE IN DISTRIBUTED CACHING - System and method of detection and management of user interactions with foreground applications on a mobile device in distributed caching are disclosed. One embodiment includes a method of mimicking, remote from the mobile device, timing characteristics of user activity with the mobile client, polling a content source for the mobile application based on the timing characteristics of the user interaction, on behalf of the mobile device and allowing responses cached on the mobile device for the user activity to be used until a change at the content source is detected, remote from the mobile device. | 07-11-2013 |
20130173756 | OPERATION MODES FOR MOBILE TRAFFIC OPTIMIZATION AND CONCURRENT MANAGEMENT OF OPTIMIZED AND NON-OPTIMIZED TRAFFIC - Systems and methods of operation modes for mobile traffic optimization and management of concurrent optimized and non-optimized traffic are disclosed. One embodiment includes classifying and handling traffic sent to and from mobile device applications running on a mobile device, the method includes, analyzing, on the mobile device, requests from the mobile device applications for recurrent patterns; traffic having a recurrent pattern is optimizable traffic and traffic with an unidentifiable pattern is non optimizable traffic, managing the optimizable traffic to reduce an amount of wireless data and signaling traffic sent to and from the mobile device and/or routing the non optimizable traffic from the mobile device applications to a service provider. In one embodiment, upon determining a problem communicating with the server, request are routed from the one or more mobile device applications directly to a service provider, the routed traffic bypassing a client-side proxy. | 07-04-2013 |
20130170348 | HIERARCHIES AND CATEGORIES FOR MANAGEMENT AND DEPLOYMENT OF POLICIES FOR DISTRIBUTED WIRELESS TRAFFIC OPTIMIZATION - Systems and methods for deploying and employing policies for wireless traffic optimization in a wireless network based on hierarchies are disclosed. One embodiment includes deploying a global policy set of the policies for wireless traffic optimization among mobile devices in the wireless network and deploying a first policy set of the policies among a first subset of mobile devices among the mobile devices. In one embodiment, the first subset of mobile devices meet a device-based criteria including one or more of, device type, device platform, or device model and any policy of the first policy set overwrites any policy of the global policy set in case of conflict when deployed on any of the first subset of mobile devices. | 07-04-2013 |
20130166669 | SYSTEM AND METHOD FOR A MOBILE DEVICE TO USE PHYSICAL STORAGE OF ANOTHER DEVICE FOR CACHING - Systems and methods for a mobile device to use physical storage of another device for caching are disclosed. In one embodiment, a mobile device is able to receive over a cellular or IP network a response or content to be cached and wirelessly access the physical storage of the other device via a wireless network to cache the response or content for the mobile device. | 06-27-2013 |
20130163431 | RADIO-AWARENESS OF MOBILE DEVICE FOR SENDING SERVER-SIDE CONTROL SIGNALS USING A WIRELESS NETWORK OPTIMIZED TRANSPORT PROTOCOL - System and method of radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol are disclosed. One embodiment includes a method of sending a message over an alternate channel to a mobile device in the presence of an open TCP connection with a mobile device, including sending the message over the alternate channel to the mobile device, without utilizing the open TCP connection, responsive to determining that a timing criteria has been met. The alternate channel utilized need not cause a radio of the mobile device to switch on. | 06-27-2013 |
20130159511 | SYSTEM AND METHOD FOR GENERATING A REPORT TO A NETWORK OPERATOR BY DISTRIBUTING AGGREGATION OF DATA - System and method for generating a report to a network operator by distributed aggregation of data are disclosed. One embodiment includes determining, by a server-side proxy, optimization efficiency for wireless network traffic; tracking, by the server-side proxy, user-related information in the wireless network; based on the optimization efficiency and/or the user-related information, generating the report to be delivered to the network operator or queried by the network operator. In one embodiment, the server-side proxy performs functions related to traffic optimization and management in the wireless network effectuating in traffic alleviation in the wireless network measured by the optimization efficiency. | 06-20-2013 |
20130159395 | MOBILE NETWORK REPORTING AND USAGE ANALYTICS SYSTEM AND METHOD AGGREGATED USING A DISTRIBUTED TRAFFIC OPTIMIZATION SYSTEM - Mobile network reporting and usage analytics system and method are disclosed. One embodiment includes a method generating a report for a network operator, which may be implemented on a system, including tracking optimization efficiency for traffic in a wireless network, generating the report to be provided to the network operator based on the optimization efficiency and performing functions related to traffic optimization and management in the wireless network effectuating in traffic alleviation in the wireless network measured by the optimization frequency. The optimization efficiency can include efficiency information associated with different mobile applications and user-related information in a wireless network. | 06-20-2013 |
20130151709 | SYSTEM OF REDUNDANTLY CLUSTERED MACHINES TO PROVIDE FAILOVER MECHANISMS FOR MOBILE TRAFFIC MANAGEMENT AND NETWORK RESOURCE CONSERVATION - Systems of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation are disclosed. One embodiment includes a system of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation including, a first set of redundantly clustered machines coupled to a second set of redundantly clustered machines via a common repository node where each of the first and second set of redundantly clustered machines function independently to provide mobile traffic management or network resource conservation services. The first and second set of redundantly clustered machines can be physically located in different data centers or in the same data center. | 06-13-2013 |
20130151649 | MOBILE DEVICE HAVING CONTENT CACHING MECHANISMS INTEGRATED WITH A NETWORK OPERATOR FOR TRAFFIC ALLEVIATION IN A WIRELESS NETWORK AND METHODS THEREFOR - Mobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor are disclosed. One embodiment includes a method of integration of content caching with a network operator for traffic alleviation a wireless network, which may be embodied on a mobile device, including determining whether a cache element stored in a local cache on the mobile device for an application poll on the mobile device is valid and forwarding the application poll to an external entity to service the application poll in response to determining that the cache element is no longer valid. The external entity is in part managed by the network operator of the wireless network and can be in part or in whole, a component of an infrastructure of the network operator or external to an infrastructure of the network operator. | 06-13-2013 |
20130151648 | FLEXIBLE AND DYNAMIC INTEGRATION SCHEMAS OF A TRAFFIC MANAGEMENT SYSTEM WITH VARIOUS NETWORK OPERATORS FOR NETWORK TRAFFIC ALLIEVIATION - Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation are disclosed. One embodiment includes a method of integration of content caching with a network operator for traffic alleviation a wireless network, including detecting, by an operator proxy of the network operator, a poll from an application on a mobile device which would have been served using a cache element from a local cache on the mobile device, after the cache element stored in the local cache has been invalidated and forwarding the poll from the application on the mobile device to a proxy server. Whether the poll is sent to a service provider of the application directly by the proxy server, or by the proxy server through the operator proxy is configurable or reconfigurable. | 06-13-2013 |
20130145017 | OPTIMIZATION OF MOBILE TRAFFIC DIRECTED TO PRIVATE NETWORKS AND OPERATOR CONFIGURABILITY THEREOF - Systems and methods for optimization of mobile traffic directed to private networks and operator configurability thereof are disclosed. One embodiment includes a method, which may be implemented on a system, for identifying a network accessed by mobile traffic at a mobile device, identifying an operator of the network, and/or determining whether the mobile traffic is directed towards a private or public network. In response to determining that the mobile traffic is directed towards a private network, determining whether the private network is owned by or operated by the operator. Optimization of the mobile traffic is performed based on policies set by the operator. In general, the system maintains and/or enforces different sets of policies regarding mobile traffic optimization set by different and multiple operators. | 06-06-2013 |
20130145010 | Mobile Device And Method To Utilize The Failover Mechanism For Fault Tolerance Provided For Mobile Traffic Management And Network/Device Resource - A mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management are disclosed. One embodiment includes a method, which may be implemented on a system or a mobile device which responsive to detecting a failed attempt to connect to a proxy server, determines whether the proxy server is reachable. In one embodiment, in response to determining that the proxy server is reachable, initiates a failover process by reconfiguring DNS routing rules. | 06-06-2013 |
20130142050 | CELLULAR OR WIFI MOBILE TRAFFIC OPTIMIZATION BASED ON PUBLIC OR PRIVATE NETWORK DESTINATION - Systems and methods for cellular or WIFI mobile traffic optimization based on public or private network destination are disclosed. One embodiment includes a mobile device whose traffic is optimized based on destination IP network type where the mobile device includes a local proxy which detects outgoing traffic and determines whether the outgoing traffic is directed towards a public IP network or private IP network. In general, the outgoing traffic is categorized as optimizable for mobile device battery conservation and/or network resource conservation if the outgoing traffic is directed towards the public IP network. Optimization of the outgoing traffic can be performed by a native operating system of the mobile device or an application that is non-native to the native operating system of the mobile device. The optimization can also be in part or in whole performed by a remote proxy in communication with the local proxy on the mobile device. | 06-06-2013 |
20130041974 | APPLICATION AND NETWORK-BASED LONG POLL REQUEST DETECTION AND CACHEABILITY ASSESSMENT THEREFOR - Systems and methods for application and network-based long poll request detection and cacheability assessment therefore are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a distributed proxy and cache system, including, determining relative timings between a first request initiated by the application, a response received responsive to the first request, and a second request initiated subsequent to the first request also by the application. The relative timings can be compared to request-response timing characteristics for other applications to determine whether the requests of the application are long poll requests. | 02-14-2013 |
20120317370 | CACHE STATE MANAGEMENT ON A MOBILE DEVICE TO PRESERVE USER EXPERIENCE - Systems and methods for cache state management to preserve user experience with a mobile application on a mobile device while conserving resources in a wireless network are disclosed. In one embodiment, the method can include, for example, storing content from a content server as cached elements in a local cache on the mobile device and in response to receiving polling requests to contact the content server, retrieving the cached elements from the local cache to respond to the polling requests made at the mobile device, and/or using state information associated with the cached elements to provide the cached elements as responses to the polling requests such that user experience is preserved. | 12-13-2012 |
20110252088 | SYSTEM FOR PROVIDING POLICY BASED CONTENT SERVICE IN A MOBILE NETWORK - Serving user selected content in accordance with a service policy is disclosed. The user may select content from a content source to be accessed at a mobile device. The desired content is modified as necessary such that transmission of the content complies with a policy. Alternatively, only content that complies with the policy may be made available for selection. The manner in which a policy is defined and the content provided may be determined by various factors including mobile device capabilities, user preferences, and network conditions. | 10-13-2011 |
20090016526 | METHOD AND APPARATUS FOR INTERCEPTING EVENTS IN A COMMUNICATION SYSTEM - An intercept system provides more effective and more efficient compliance with legal intercept warrants. The intercept system can provide any combination of operations that include near-real-time intercept capture of intercepted data in structured authenticated form, clear text intercept for communications where there is access to encryption keys, cipher text intercept for communications where there is no access to encryption keys, provision of transactional logs to the authorized agency, interception without altering the operation of the target services, and encryption of stored intercepted information. | 01-15-2009 |