Abstract: A system with distributed proxy for reducing traffic in a wireless network satisfies data requests made by a mobile application. The system includes a mobile device having a local proxy for intercepting a data request made by the mobile application. The local proxy simulates application server responses for the mobile application on the mobile device for data requests where responses are available in the local cache. A proxy server is coupled to the mobile device and an application server to which the data request is made. The proxy server is able to communicate with the local proxy. The local proxy forwards the data request to the proxy server for transmission to the application server for a response to the data request. The proxy server queries the application server for any changes to the data request that the mobile application has previously made and notifies the local proxy of such changes.
Abstract: Techniques for temporarily and/or partially offloading mobile applications to one or more remote virtual machines in a server include establishing an application copy of a mobile application installed on a mobile device at a remote virtual machine, suspending the mobile application on the mobile device and offloading operations of the mobile application to the application copy at the remote virtual machine for a period of time. Suspending the mobile application and offloading its operations to the remote virtual machine for the period of time reduces consumption of resources on the mobile device. The virtual machine executes the application copy in the same manner the mobile device would execute the mobile application and transfers data from the execution to the mobile application at the end of the period of time to allow the mobile application to update itself and resume its operation without any loss of data or functionality.
Abstract: Systems and methods of operation modes for mobile traffic optimization and management of concurrent optimized and non-optimized traffic are disclosed. One embodiment includes classifying and handling traffic sent to and from mobile device applications running on a mobile device, the method includes, analyzing, on the mobile device, requests from the mobile device applications for recurrent patterns; traffic having a recurrent pattern is optimizable traffic and traffic with an unidentifiable pattern is non optimizable traffic, managing the optimizable traffic to reduce an amount of wireless data and signaling traffic sent to and from the mobile device and/or routing the non optimizable traffic from the mobile device applications to a service provider. In one embodiment, upon determining a problem communicating with the server, request are routed from the one or more mobile device applications directly to a service provider, the routed traffic bypassing a client-side proxy.
Abstract: Systems and methods for optimizing keepalives or other non-interactive or background traffic from applications on a mobile device are disclosed. A keepalive optimizer can detect keepalive and other background traffic and optimize such traffic by blocking keepalives, advancing or delaying execution of keepalives, delaying repeatable background requests based on radio state, device state or characteristics, policy, transaction characteristics, application characteristics, and/or the like. The disclosed keepalive optimization methods facilitate management of traffic and/or conservation of resources on the mobile device and the network. The keepalive optimization can be performed by an application sending the keepalives or by a local proxy on the mobile device.
Type:
Grant
Filed:
August 12, 2016
Date of Patent:
November 14, 2017
Assignee:
Seven Networks, LLC
Inventors:
Abhay Nirantar, Andrii Kokhanovskyi, Nariman D. Batlivala, Rami Al-Isawi, Sungwook Yoon, Michael Fleming, Ari Backholm
Abstract: The disclosed technology includes systems and methods for modeling signaling and/or connections in a mobile network, and specifically, the benefits of any optimization technique on the traffic including signals and/or connections in the mobile network. Embodiments can allocate signaling to specific applications (e.g., to determine which applications are chatty and which can cause problematic signaling), and/or to further model the optimizations or savings utilizing the disclosed traffic optimization technology. In some embodiments, to enable or enhance the performance of the data traffic and signal optimization for the network, the disclosed technology includes one or more fields (e.g., an expanded “CRCS” fields) that are calculated by, for example, a CRCS analysis core module, to define and identify at least: (1) whether a transaction causes a connection (and thus signaling); and (2) the number of connections that are reduced or saved by the disclosed embodiments of distributed caching and proxy system.
Abstract: The subject matter described herein includes methods, systems, and computer program products for data traffic signature-based detection and protection against malware. According to one method, data traffic and behavior associated with a computing device is monitored and a device activity signature is created that includes an abstraction of the data traffic. A classification of the device activity signature is determined and a policy decision for the computing device is applied based on the determined classification.
Abstract: A method for conserving device and/or network resources is provided herein. The method includes detecting a wakelock operating on a mobile device and determining a consumption of one of a power or radio usage attributed to the detected wakelock. The method further includes determining a criticality related to user experience for the detected wakelock and releasing the detected wakelock based on the determined consumption and criticality. Related systems and mobile devices are also disclosed.
Abstract: A system, method and non-transitory computer code for operating a proxy server operating under software to cause the proxy server to access a communication network and to delay, advance or block keep-alives for a client device to improve traffic data flow.
Type:
Grant
Filed:
December 9, 2016
Date of Patent:
October 24, 2017
Assignee:
Seven Networks, LLC
Inventors:
Ari Backholm, Andrii Kokhanovskyi, Michael Fleming, Sungwook Yoon
Abstract: The disclosed technology includes systems and methods for optimizing network traffic management in a mobile network. One method includes determining if a mobile application executing on a mobile device is associated with network signaling requiring a corresponding radio connection. At least a portion of the network signaling caused by the transactions is filtered. The filtered network signaling does not cause a corresponding radio connection. A signaling efficiency is calculated that indicates a total number of the radio connections that are saved as a result of the filtering.
Type:
Grant
Filed:
August 21, 2015
Date of Patent:
September 19, 2017
Assignee:
Seven Networks, LLC
Inventors:
Ari Backholm, Jeff Carlson, Yuan Kang Lee, Parul Kalra
Abstract: A method and system are for generating a report for delivery to or access or query by a network operator by determining, by a server-side proxy, optimization efficiency for traffic in a wireless network, tracking, by the server-side proxy, user-related information in the wireless network, generating, based on at least one of the optimization efficiency and the user-related information, a report for delivery to or access by an operator of the wireless network, the report including an alert of viral take-up of a new application, and performing, by the server-side proxy, traffic optimization functions alleviating traffic in the wireless network.
Abstract: Systems and methods for authenticating access to multiple data stores substantially in real-time are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method may include receipt of a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.
Type:
Grant
Filed:
November 28, 2016
Date of Patent:
September 19, 2017
Assignee:
Seven Networks, LLC
Inventors:
Jay Sutaria, Brian Daniel Gustafson, Robert Paul van Gent, Ruth Lin, David Merriwether, Parvinder Sawhney
Abstract: Detection of network transactions or keepalives for maintaining long lived connections are disclosed. A keepalive detector can detect keepalive traffic based on keepalive parameters determined from an analysis of socket level network communication log data that record data transfer events including data sent from mobile applications or clients on a mobile device and data received by the mobile applications or clients on the mobile device, timing characteristics, protocol types, etc. Various statistical analyses can be performed on the network communication data to detect keepalives, taking into account variability in intervals of the data transfer events and sizes of data sent and received on each event. The keepalive detector can also detect keepalives from stream data on a mobile device by analyzing socket level communication messages including timing characteristics and amount of data transferred to detect keepalives and report keepalives using a data structure.
Type:
Grant
Filed:
February 27, 2017
Date of Patent:
September 5, 2017
Assignee:
Seven Networks, LLC
Inventors:
Ari Backholm, Michael Fleming, Andrii Kokhanovskyi, Sungwook Yoon
Abstract: A policy based content delivery system is provided. The system includes a mobile device configured to select and receive content and a content source configured to provide content selected by the mobile device to a content server. The content source is further configured to modify content selected by the mobile device prior to the content server providing the selected content to the mobile device. A content server is configured to discover content at a content source and provide a list of detected content to the mobile device for selection. The content server is further configured to instruct the content source to provide the content in accordance with a policy. The content server includes a policy enforcement engine configured to implement a policy.
Abstract: A method for conserving network and battery usage is provided. The method includes determining that a device is communicating over at least two overlapping push channels and blocking one of the push channels to eliminate or reduce overlap between the at least two overlapping push channels. Related systems are also provided.
Type:
Grant
Filed:
April 14, 2016
Date of Patent:
July 25, 2017
Assignee:
Seven Networks, LLC
Inventors:
Rami Alisawi, Ari Backholm, Huajie Hu, Alexandr Seleznyov, Jie Wei, Sungwook Yoon
Abstract: The disclosed technology includes methods, systems, and computer readable media for optimizing network traffic management in a mobile network. One method includes determining, by a network optimization client of a mobile device, a packet call quality (PCQ) associated with transmission of packets between the mobile device and a mobile communications network. The PCQ includes a numerical indication of call quality. A congestion recognition (CR) module of the mobile device determines a measure of user congestion based on the PCQ that indicates a total delay experienced by a user of the mobile device during the transmission of packets.
Abstract: A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.
Type:
Grant
Filed:
April 27, 2016
Date of Patent:
July 18, 2017
Assignee:
Seven Networks, LLC
Inventors:
Lee R. Boynton, Trevor A. Fiatal, Scott M. Burke, Mark Sikes
Abstract: Systems and methods for operating a mobile virtual network are disclosed. A mobile virtual network operator is disclosed as an entity that provides a mobile networking service to a user, the mobile networking service being provided using a physical mobile network provided by a third party. The mobile virtual network operator may provide content distribution services, data access services, or messaging services to a user of a mobile device.
Abstract: Systems and methods for prediction of activity session for mobile network use optimization and user experience enhancement are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system for enhancing user experience with a mobile application on a mobile device including, using user activity characteristics at a mobile device and server activity characteristics of a host server to anticipate a future activity session at the mobile device and transferring impending content from the host server the mobile device to pre-cache content on the mobile device to support predicted data activity for the future activity session that has been predicted.
Abstract: Systems and methods for prediction of activity session for mobile network use optimization and user experience enhancement are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system for enhancing user experience with a mobile application on a mobile device including, using user activity characteristics at a mobile device and server activity characteristics of a host server to anticipate a future activity session at the mobile device and transferring impending content from the host server the mobile device to pre-cache content on the mobile device to support predicted data activity for the future activity session that has been predicted.
Abstract: A method for managing applications configured for execution on a mobile device is provided. The method includes receiving one or more network access requests from one or more applications executing on the mobile device, determining that the mobile device is operating in a background mode, suppressing transmission to a network of the one or more network access requests based on the determination, and transmitting a subset of the one or more network access requests upon transition out of the background mode.
Type:
Grant
Filed:
February 24, 2015
Date of Patent:
May 23, 2017
Assignee:
Seven Networks, LLC
Inventors:
Michael Luna, Ari Backholm, Mikko Tervahauta