Abstract: Systems and methods for distributed caching for resource and mobile network traffic management are disclosed. In one aspect, embodiments of the present disclosure include a distributed proxy and cache system, including, means for, detecting a first data request made by a first mobile application on a mobile device; means for, retrieving cached elements stored in a local cache on the mobile device to respond to the first data request; means for, detecting a second data request made by a second mobile application on the mobile device, and/or means for, establishing connectivity of the mobile device to the wireless network to satisfy the second data request made.
Abstract: Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
Abstract: Providing a mobile device with web-based access to data objects is disclosed. Authentication information is sent from a mobile device to a relay server. The relay server executes a connection application to establish a connection to a web access server. The authentication information is provided to the web access server associated with a data store hosting a data object. Upon authentication, the data object is provided to the relay server from the data store. The data object is then provided to the mobile device.
Abstract: Systems and methods for mobile network congestion recognition for optimization of mobile traffic are disclosed. A mobile device having a local proxy equipped with congestion recognition capabilities can sample time consumed to establish data connection between the mobile device and the mobile network, collect data including at least one of signal strength data, cell identifier, and location area code associated with the data connection between the mobile device and the mobile network, and anticipate network congestion, based at least on the time consumed and the collected data. On detecting mobile network congestion, the local proxy can apply a blocking policy to block all or low priority traffic from signaling the congested mobile network to ease the congestion.
Abstract: Systems and methods for dynamic adjustment of keep-alive message intervals in a mobile network are disclosed. One embodiment of maintaining an IP connection between a mobile terminal and a network node over a network includes, detecting a rate with which the client-slide request are made from the mobile terminal, detecting a rate with which the client-slide request are made from the mobile terminal, sending, by the network node, keep-alive messages to the mobile terminal in an absence of network traffic through the IP connection between the mobile terminal and the network node, and/or further optimizing the time intervals between the keep-alive messages based on a cost to send the keep-alive messages in the network.
Abstract: System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief are disclosed. In one embodiment, a method for simulating traffic requests from a mobile device, which can be implemented on a system includes, predicting that a request is to be made by the mobile device, in advance of the request being sent to a destination by the mobile device and making the request, at an entity separate from the mobile device, on behalf of the mobile device to the destination. The entity can simulate the request and based on a traffic pattern of outgoing requests by an application on the mobile device.
Abstract: A system and method for tracking billing events in a mobile wireless network for a network operator is disclosed. The method can include, in one embodiment, capturing, by a server, event data associated with a mobile device. The event data specifies communication events at the mobile device and are captured are specific to a network operator which provides services to the mobile device. The method can further include, generating billing data for the mobile device using the event data and associated parameters, and providing, by the server, the billing data to the network operator providing services to the mobile device.
Type:
Grant
Filed:
April 28, 2011
Date of Patent:
September 9, 2014
Assignee:
Seven Networks, Inc
Inventors:
Jay Sutaria, Sridhar Nanjundeswaran, Brian Gustafson, Robert van Gent
Abstract: Systems and methods for management of a network connection without heartbeat messages are disclosed. One embodiment of a distributed proxy system performs a method for the communication of state between a client and a server in a distributed content delivery network using a state map. The state map sets a predicted communication correspondence frequency and thus eliminates the use or need of heart beat messages to manage session state and/or convey health status of system components.
Type:
Grant
Filed:
April 3, 2013
Date of Patent:
August 19, 2014
Assignee:
Seven Networks, Inc.
Inventors:
Michael Luna, Mikko Tervahauta, Yixin Pan
Abstract: A real-time communication architecture establishes a continuous connection between an enterprise network and a communication management system. The connection is continuously held open allowing mobile devices real-time access to enterprise email systems. The real-time communication architecture can support an entire enterprise email system or individual email users. The foregoing and other objects, features and advantages of the invention will become more readily apparent from the following detailed description of a preferred embodiment of the invention which proceeds with reference to the accompanying drawings.
Type:
Grant
Filed:
May 5, 2011
Date of Patent:
August 19, 2014
Assignee:
Seven Networks, Inc.
Inventors:
Trevor A. Fiatal, Lee R. Boynton, Scott M. Burke, Brian D. Gustafson, Binu Raj, William Alvarado, Juan Benitez, Fred J. Duncan
Abstract: Methods and systems for maintaining mobile terminal information for secure email communications are provided. Information concerning multiple mobile terminals are maintained. Such information may include encryption information and an identifier for each mobile terminal. A service activation code that includes encryption information and an identifier from an authenticated user of the mobile terminal is received. The encryption information may be provided to a connectivity function for use in establishing an encrypted data channel. The established encrypted data channel may then be used to convey e-mail communications to and from the mobile terminal.
Type:
Grant
Filed:
September 5, 2008
Date of Patent:
August 12, 2014
Assignee:
Seven Networks, Inc.
Inventors:
Ari Backholm, Jukka Ahonen, Marcus Groeber, Seppo Salorinne, Lauri Vuornos, Antti Saarlilahti, Marko Ketonen, Petri Salmi
Abstract: Methods and system for integrated messaging are disclosed. Interaction by a user of a mobile device with a graphic user interface of the mobile device is detected. A command is generated based on such interaction independent of further user interaction. An SMS message including the command is transmitted to server, which stores executable instructions associated with the command. Such instructions provide for generation of data in response to the command and may be executed by the server (or another server). The responsive data is then transmitted to the mobile device.
Abstract: Providing a mobile device with web-based access to data objects is disclosed. Authentication information is sent from a mobile device to a relay server. The relay server executes a connection application to establish a connection to a web access server. The authentication information is provided to the web access server associated with a data store hosting a data object. Upon authentication, the data object is provided to the relay server from the data store. The data object is then provided to the mobile device.
Abstract: An architecture for optimizing signaling for arbitrary proprietary and non-proprietary protocols. In one embodiment, a Transmission Control Protocol (TCP) stream is passed as a byte stream from an application to a local proxy over a first session, from the local proxy to a proxy server over a second TCP session, and from the proxy server to a content server over a third TCP session. The local proxy observes and identifies patterns within the byte stream, without being aware of the underlying protocol. Once a pattern is identified, the second TCP session is torn down such that the first TCP session replays the pattern to the application, and third TCP session replays the pattern to the content server. Once either side detects a change in the pattern, the second TCP session is re-established to deliver the changed content to the other end.
Abstract: Systems and methods for delivering digital content to a mobile device from a digital content provider are disclosed. Digital content is selected using a selection interface on the mobile device. The selected content is then transferred to a computing device by the digital content provider and subsequently transferred to the mobile device by the computing device. In some embodiments, the digital content is reformatted before being transferred to the mobile device. The digital content may be streamed from the computer system to the mobile device. A service provider of a network through which the mobile device connects to the digital content provider may bill a user of the mobile device on behalf of the digital content provider. The digital content provider may bill the user of the mobile device using a Premium SMS service.
Abstract: Systems and methods for improving battery life and transmission efficiency of mobile devices are disclosed. Some embodiments provide for application and/or context aware fast dormancy on a mobile device or user equipment (UE) and/or via a proxy server. By incorporating application and context information, e.g., when an application opens a connection, what kind of applications are present, how the application normally behaves and whether the application is running in background or transmitting background data, embodiments provide for an improved and enhanced fast dormancy operation.
Type:
Application
Filed:
March 15, 2013
Publication date:
July 24, 2014
Applicant:
Seven Networks, Inc.
Inventors:
Mohanad Ismail, Michael Wendling, Ari Backholm
Abstract: Systems and methods for improving battery life and transmission efficiency of mobile devices are disclosed. Some embodiments provide for application and/or context aware fast dormancy on a mobile device or user equipment (UE) and/or via a proxy server. By incorporating application and context information, e.g., when an application opens a connection, what kind of applications are present, how the application normally behaves and whether the application is running in background or transmitting background data, embodiments provide for an improved and enhanced fast dormancy operation.
Type:
Application
Filed:
March 15, 2013
Publication date:
July 24, 2014
Applicant:
Seven Networks, Inc.
Inventors:
Mohanad Ismail, Michael Wendling, Ari Backholm
Abstract: Methods and systems for application discovery on mobile devices are provided. A subscriber identity module (SIM) card associated with a mobile device sends information to a network server, which determines an identifier (e.g., a phone number) associated with the SIM card. Using the identifier, the network server provides application information to the mobile device. The application information, which may include the application itself, is then used to install the application on the mobile device.
Abstract: Methods and system for integrated messaging are disclosed. Interaction by a user of a mobile device with a graphic user interface of the mobile device is detected. A command is generated based on such interaction independent of further user interaction. An SMS message including the command is transmitted to server, which stores executable instructions associated with the command. Such instructions provide for generation of data in response to the command and may be executed by the server (or another server). The responsive data is then transmitted to the mobile device.
Abstract: System and method of dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications are disclosed. One embodiment includes mobile device which throttles radio use based on user habit. The mobile device is able to throttle the radio between high and lowered power states based on the user habit of a user using the mobile device in mobile usage sessions relating to, for example, browsing activity or content streaming activity, where, the radio can be throttled among three power states when connected to a 3G wireless network or throttled among two power states when connected to a 4G or LTE network/pre-LTE.
Abstract: Embodiments of the present disclosure include systems and methods for management of mobile device radio state. In some embodiments, a method, which can be implemented on a system, allows a network component (e.g., the policy and charging rules function in a UMTS network) to determine whether a mobile device is idle or active. Based on this determination, the network component may modify the behavior of a network element (e.g., a base station, eNode B or Node B) in relation to promotion or demotion of the mobile device's radio state. In some embodiments, the disclosed system can include a client side component on the mobile device which can determine criteria to be used by the network component to govern and optimize changes in mobile device radio state in a manner that conserves device and network resources.