Abstract: Embodiments of the present disclosure include systems and methods for management of mobile device radio state. In some embodiments, a method, which can be implemented on a system, allows a network component (e.g., the policy and charging rules function in a UMTS network) to determine whether a mobile device is idle or active. Based on this determination, the network component may modify the behavior of a network element (e.g., a base station, eNode B or Node B) in relation to promotion or demotion of the mobile device's radio state. In some embodiments, the disclosed system can include a client side component on the mobile device which can determine criteria to be used by the network component to govern and optimize changes in mobile device radio state in a manner that conserves device and network resources.
Abstract: System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief are disclosed. In one embodiment, a method for simulating traffic requests from a mobile device, which can be implemented on a system includes, predicting that a request is to be made by the mobile device, in advance of the request being sent to a destination by the mobile device and making the request, at an entity separate from the mobile device, on behalf of the mobile device to the destination. The entity can simulate the request and based on a traffic pattern of outgoing requests by an application on the mobile device.
Abstract: Systems and methods for recognizing congestion in a mobile network to make intelligent decisions regarding connecting to an operator network is disclosed. A mobile device having a local proxy equipped with congestion recognition capabilities can use time elapsed to establish connection with a mobile base station in the mobile network to recognize congestion at the mobile base station. Further, in response to recognizing congestion at the mobile base station, the local proxy can selectively block traffic from the mobile device from traversing the mobile network to reduce signaling overload on the mobile network.
Abstract: Systems and methods for dynamic electronic-mail filtering for mobile devices are provided. Incoming e-mail messages are received and provided to an e-mail inbox associated with the intended recipient. Those e-mail messages are evaluated to determine whether they may be desirable to the recipient. Desirability of an e-mail may be determined by such factors as the e-mail address of origin or key words in subject line. E-mail messages determined to be desirable are provided to a mobile device associated with the recipient. The recipient may then be notified concerning the desirable messages.
Abstract: Currently, the radio on the device is the only one aware of network congestion while applications are not. At the same time, only the application is aware of the criticality of information it needs to send across the network. In order to address mobile network congestion more effectively, device radio needs to become application aware or application becomes radio aware. This way, the device radio knows the priority of the application traffic and does not blindly block critical information while allowing non critical information to be transferred or the application knows that the network is congested and uses it efficiently. The current congestion management mechanisms have their triggers and corrective actions limited to the device radio level without any regard to application. To address this problem, the disclosed technology includes a solution for congestion management where the trigger is on radio level while corrective measures are at IP/application layer.
Abstract: Resource management in a wireless network is facilitated by caching content on a mobile device. The resource management method includes detecting a data request to a content source for which content received is stored as cache elements in a local cache on the mobile device, determining, from an identifier of the data request, that a cache defeating mechanism is used by the content source, and/or retrieving content from the cache elements in the local cache to respond to the data request.
Abstract: A system for mobile device poll creation and conductance disclosed. A poll is created using poll creation software on a mobile device, personal computer or a web-based application. A polling server then validates the poll and publishes the poll to one or more mobile devices. The users of the one or mobile devices may then respond to the poll via their mobile device, a personal computer, or a web-based application. The results are sent to the polling server and are processed. The results of the poll are then published to the poll creator and the poll participants.
Abstract: Systems and methods for cache state management to preserve user experience with a mobile application on a mobile device while conserving resources in a wireless network are disclosed. In one embodiment, the method can include, for example, storing content from a content server as cached elements in a local cache on the mobile device and in response to receiving polling requests to contact the content server, retrieving the cached elements from the local cache to respond to the polling requests made at the mobile device, and/or using state information associated with the cached elements to provide the cached elements as responses to the polling requests such that user experience is preserved.
Abstract: System and method of dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications are disclosed. One embodiment includes mobile device which throttles radio use based on user habit. The mobile device is able to throttle the radio between high and lowered power states based on the user habit of a user using the mobile device in mobile usage sessions relating to, for example, browsing activity or content streaming activity, where, the radio can be throttled among three power states when connected to a 3G wireless network or throttled among two power states when connected to a 4G or LTE network/pre-LTE.
Abstract: Systems and methods for wireless network traffic routing through traffic optimization and tracking of destination and/or origination addresses in conjunction with billing policies to facilitate service provider billing is disclosed. Since the distributed proxy system, which includes, for example, a proxy server and/or a local proxy on the mobile device, can intercept traffic to and/or from the mobile device, the intercepted traffic may or may not access the wireless network and/or reach the addressed destination. Thus, for outgoing and incoming requests directed from or directed to the mobile device, the distributed proxy system tracks and stores a destination address (e.g., a destination IP address). The proxy server can extract and store the origination address for each incoming communication for various mobile devices and apply applicable billing policies such that a service provider can bill or otherwise manage incoming communications to the mobile devices.
Abstract: Systems and methods for wireless network traffic routing through traffic optimization and tracking of destination and/or origination addresses to facilitate service provider billing is disclosed. Since the distributed proxy system, which includes, for example, a proxy server and/or a local proxy on the mobile device, can intercept traffic to and/or from the mobile device, the intercepted traffic may or may not access the wireless network and/or reach the addressed destination. Thus, for outgoing and incoming requests directed from or directed to the mobile device, the distributed proxy system tracks and stores a destination address (e.g., a destination IP address). The proxy server can extract and store the origination address for each incoming communication for various mobile devices such that a service provider can bill or otherwise manage incoming communications to the mobile devices.
Abstract: A system and method for translating, synthesizing and acting upon disparate event sets is provided. The disclosed cross-platform event engine comprises an event module with information pertaining to various event inputs as they relate to different operating platforms and devices. Logic utilized by the cross-platform event engine determines how to handle a particular event within an operating environment. Methods of updating and training the engine are also provided.
Abstract: Systems and methods of intelligent customer service/call center services enhanced using real-time and historical mobile application and traffic-related statistics collected by a distributed caching system in a mobile network are disclosed. The data can be tracked by a client-side and/or a server-side reporting engine and usage analytics engine. Reports can also be generated by the system from the data and provided to the customer service/call center, such as trend charts showing optimization efficiency of traffic over a network and battery consumption vs. application load for a mobile device as a function of time.
Abstract: Systems and methods for management of a network connection without heartbeat messages are disclosed. One embodiment of a distributed proxy system performs a method for the communication of state between a client and a server in a distributed content delivery network using a state map. The state map sets a predicted communication correspondence frequency and thus eliminates the use or need of heart beat messages to manage session state and/or convey health status of system components.
Type:
Application
Filed:
April 3, 2013
Publication date:
October 10, 2013
Applicant:
SEVEN NETWORKS, INC.
Inventors:
Michael Luna, Mikko Tervahauta, Yixin Pan
Abstract: Systems and methods of enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network are disclosed. The data can be tracked by a client-side and/or a server-side reporting engine and usage analytics engine. Reports can also be generated by the system from the data and provided to the customer service/call center, such as trend charts showing optimization efficiency of traffic over a network and battery consumption vs. application load for a mobile device as a function of time.
Abstract: A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.
Type:
Grant
Filed:
February 14, 2012
Date of Patent:
October 1, 2013
Assignee:
Seven Networks, Inc.
Inventors:
Lee R. Boynton, Trevor A. Fiatal, Scott M. Burke, Mark Sikes
Abstract: Systems and methods for aligning data transfer to optimize connections established for transmission over a wireless network are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, for aligning data transfer to a mobile device to optimize connections made by the mobile device in a cellular network. The method includes batching data received in multiple transactions directed to a mobile device for transmission to the mobile device over the cellular network such that a wireless connection need not be established with the mobile device every time each of the multiple transactions occurs. For example, the data received in the multiple transactions for the mobile device can be sent to the mobile device, in a single transaction over a single instantiation of wireless network connectivity at the mobile device.
Abstract: Mobile devices which hand over connectivity from one network connection to another network connection without interruption in application data flow and methods therefor are disclosed. One embodiment further includes, a system for managing handover from a first wireless connection to a second wireless connection for applications, the system including, a network interface operable to communicate with the first wireless network and the second wireless network, wherein the network interface is operable to receive first data from a first wireless network and receive second data for the application from a second wireless network and generate a continuous data flow for applications when handover from the first wireless network to the second wireless network occurs.
Type:
Application
Filed:
March 4, 2013
Publication date:
September 5, 2013
Applicant:
SEVEN NETWORKS, INC.
Inventors:
Suresh Srinivasan, Yuan Kang Lee, Chaitali Sengupta
Abstract: System and method of providing data to a mobile application accessible at a mobile device via different network connections without interruption are disclosed. The method, which may be implemented on a system includes, receiving data for the mobile application over a network connection different from a first network connection, and/or providing the data received over the network connection including any other data received from the first network connection, to the mobile application in a manner that is without interruption in data flow. The data is provided to the mobile application without interruption even when connections to the different network connections require change in IP addresses.
Type:
Application
Filed:
March 4, 2013
Publication date:
September 5, 2013
Applicant:
SEVEN NETWORKS, INC.
Inventors:
Suresh Srinivasan, Yuan Kang Lee, Chaitali Sengupta
Abstract: Systems and methods of dynamic categorization of applications for network use and access in a mobile network are disclosed. Using application profile information, applications can be categorized into one of multiple categories that define restrictions on the application's access to the wireless network or cellular network. One example of such categories is the concept of black, white and grey listings. The “white” listed applications may be always allowed access, “black” listed application may never or almost never be granted network access (e.g., application may be malware like or otherwise consumes large amounts of network/device resources), and grey listed applications may be granted access based on one or more criteria.